Dataset Viewer
Auto-converted to Parquet
content
stringlengths
26
2.54k
metadata
dict
Guide to Essential Cybersecurity Controls (ECC) Implementation (GECC – 1: 2023) TLP: White Document Classification: Public
{ "creationdate": "2023-10-22T08:42:54+03:00", "creator": "Microsoft® Word LTSC", "moddate": "2023-10-22T08:42:54+03:00", "page": 0, "page_label": "1", "producer": "Microsoft® Word LTSC", "source": "/content/Guide-to-Essential-Cybersecurity-Controls-(ECC)-Implementation.pdf", "total_pages": 180 }
Guide to Essential Cybersecurity Controls (ECC) Implementation 2 Document Classification: Public TLP: White
{ "creationdate": "2023-10-22T08:42:54+03:00", "creator": "Microsoft® Word LTSC", "moddate": "2023-10-22T08:42:54+03:00", "page": 1, "page_label": "2", "producer": "Microsoft® Word LTSC", "source": "/content/Guide-to-Essential-Cybersecurity-Controls-(ECC)-Implementation.pdf", "total_pages": 180 }
Guide to Essential Cybersecurity Controls (ECC) Implementation 3 Document Classification: Public TLP: White Disclaimer: This Guide has been developed by the National Cybersecurity Authority (NCA) to enable organization to implement the Essential Cybersecurity Controls (ECC). Organizations must not rely solely on this guide to implement the ECC . They need to take into account the unique requirements of the ir organization and its environment. The NCA confirms that this document is only a guide that can be used as an illustrative model and does not necessarily mean that this is the only method of implem enting the ECC, provided that other methods do not conflict with the requirements of the NCA This document contains some illustrative deliverables related to the ECC implementation. The assessor/auditor has the right to request other evidence as deemed necessary to ensure that all requirements in the ECC are implemented.
{ "creationdate": "2023-10-22T08:42:54+03:00", "creator": "Microsoft® Word LTSC", "moddate": "2023-10-22T08:42:54+03:00", "page": 2, "page_label": "3", "producer": "Microsoft® Word LTSC", "source": "/content/Guide-to-Essential-Cybersecurity-Controls-(ECC)-Implementation.pdf", "total_pages": 180 }
Guide to Essential Cybersecurity Controls (ECC) Implementation 4 Document Classification: Public TLP: White In the Name of Allah, The Most Gracious, The Most Merciful
{ "creationdate": "2023-10-22T08:42:54+03:00", "creator": "Microsoft® Word LTSC", "moddate": "2023-10-22T08:42:54+03:00", "page": 3, "page_label": "4", "producer": "Microsoft® Word LTSC", "source": "/content/Guide-to-Essential-Cybersecurity-Controls-(ECC)-Implementation.pdf", "total_pages": 180 }
Guide to Essential Cybersecurity Controls (ECC) Implementation 5 Document Classification: Public TLP: White Traffic Light Protocol (TLP): This marking protocol is widely used around the world. It has four colors (traffic lights): Red – Personal, Confidential, and for the Intended Recipient Only The recipient has no rights to share information classified in red with any person outside the defined range of recipients, either inside or outside the organization. Amber – Restricted Sharing The recipient may share information classified in orange only with intended recipients inside the organization and with recipients who are required to take action related to the shared information. Green – Sharing within the Same Community The recipient may share information classified in green with other recipients inside the organization or outside it within the same sector or related to the organization. However, it is not allowed to exchange or p ublish this information on public channels. White – No Restriction
{ "creationdate": "2023-10-22T08:42:54+03:00", "creator": "Microsoft® Word LTSC", "moddate": "2023-10-22T08:42:54+03:00", "page": 4, "page_label": "5", "producer": "Microsoft® Word LTSC", "source": "/content/Guide-to-Essential-Cybersecurity-Controls-(ECC)-Implementation.pdf", "total_pages": 180 }
Guide to Essential Cybersecurity Controls (ECC) Implementation 6 Document Classification: Public TLP: White Table of Contents Introduction ................................................................................................................................................................7 Objective ......................................................................................................................................................................7 Scope of Work .............................................................................................................................................................7 ECC Domains and Structure ....................................................................................................................................8 Guide Structure ...........................................................................................................................................................9 ECC Implementation Guidelines .......................................................................................................................... 10 List of the Figures FIGURE 1 ECC DOMAINS AND SUBDOMAINS ........................................................................................................... 8 FIGURE 2: ECC STRUCTURE ....................................................................................................................................... 9
{ "creationdate": "2023-10-22T08:42:54+03:00", "creator": "Microsoft® Word LTSC", "moddate": "2023-10-22T08:42:54+03:00", "page": 5, "page_label": "6", "producer": "Microsoft® Word LTSC", "source": "/content/Guide-to-Essential-Cybersecurity-Controls-(ECC)-Implementation.pdf", "total_pages": 180 }
Guide to Essential Cybersecurity Controls (ECC) Implementation 7 Document Classification: Public TLP: White Introduction The National Cybersecurity Authority (referred to in this document as developed this guide for implementing the Essential Cybersecurity Controls (ECC 1: 2018), to aid national organizations in implementing the requirements that are necessary to comply with the ECC. This guide was developed based on the information and experiences that NCA collected and analyzed since the publication of the ECC and is aligned with cybersecurity best practices to facilitate the implementation of the controls across national organizations. Objective The main objective of this guide is to enable and aid national organizations in implementing the necessary and applicable E CC requirements that are needed for their compliance with the ECC, in addition to strengthening their cybersecurity posture, and reducing cybersecurity risks that may arise from internal and external cyber threats. Scope of Work This guide's scope of work is the same as the (ECC-1:2018): These controls are applicable to government organizations in the Kingdom of Saudi Arabia (including ministries, authorities, establishments, and others) and their companies and entities, as well a s private sector organizations owning, operating, or hosting Critical National Infrastructures (CNIs),
{ "creationdate": "2023-10-22T08:42:54+03:00", "creator": "Microsoft® Word LTSC", "moddate": "2023-10-22T08:42:54+03:00", "page": 6, "page_label": "7", "producer": "Microsoft® Word LTSC", "source": "/content/Guide-to-Essential-Cybersecurity-Controls-(ECC)-Implementation.pdf", "total_pages": 180 }
1-1 استراتيجية الأمن السيبراني Cybersecurity Strategy
{ "creationdate": "2023-10-22T08:42:54+03:00", "creator": "Microsoft® Word LTSC", "moddate": "2023-10-22T08:42:54+03:00", "page": 7, "page_label": "8", "producer": "Microsoft® Word LTSC", "source": "/content/Guide-to-Essential-Cybersecurity-Controls-(ECC)-Implementation.pdf", "total_pages": 180 }
1-2 إدارة الأمن السيبراني Cybersecurity Management
{ "creationdate": "2023-10-22T08:42:54+03:00", "creator": "Microsoft® Word LTSC", "moddate": "2023-10-22T08:42:54+03:00", "page": 7, "page_label": "8", "producer": "Microsoft® Word LTSC", "source": "/content/Guide-to-Essential-Cybersecurity-Controls-(ECC)-Implementation.pdf", "total_pages": 180 }
1-3 سياسات وإجراءات الأمن السيبراني Cybersecurity Policies and Procedures
{ "creationdate": "2023-10-22T08:42:54+03:00", "creator": "Microsoft® Word LTSC", "moddate": "2023-10-22T08:42:54+03:00", "page": 7, "page_label": "8", "producer": "Microsoft® Word LTSC", "source": "/content/Guide-to-Essential-Cybersecurity-Controls-(ECC)-Implementation.pdf", "total_pages": 180 }
1-4 أدوار ومسؤوليات الأمن السيبراني Cybersecurity Roles and Responsibilities
{ "creationdate": "2023-10-22T08:42:54+03:00", "creator": "Microsoft® Word LTSC", "moddate": "2023-10-22T08:42:54+03:00", "page": 7, "page_label": "8", "producer": "Microsoft® Word LTSC", "source": "/content/Guide-to-Essential-Cybersecurity-Controls-(ECC)-Implementation.pdf", "total_pages": 180 }
1-5 إدارة مخاطر الأمن السيبراني Cybersecurity Risk Management
{ "creationdate": "2023-10-22T08:42:54+03:00", "creator": "Microsoft® Word LTSC", "moddate": "2023-10-22T08:42:54+03:00", "page": 7, "page_label": "8", "producer": "Microsoft® Word LTSC", "source": "/content/Guide-to-Essential-Cybersecurity-Controls-(ECC)-Implementation.pdf", "total_pages": 180 }
1-6 الأمن السيبراني ضمن إدارة المشاريع المعلوماتية والتقنية Cybersecurity in Information Technology Projects
{ "creationdate": "2023-10-22T08:42:54+03:00", "creator": "Microsoft® Word LTSC", "moddate": "2023-10-22T08:42:54+03:00", "page": 7, "page_label": "8", "producer": "Microsoft® Word LTSC", "source": "/content/Guide-to-Essential-Cybersecurity-Controls-(ECC)-Implementation.pdf", "total_pages": 180 }
1-7 الالتزام بتشريعات وتنظيمات ومعايير الأمن السيبراني Cybersecurity Regulatory Compliance
{ "creationdate": "2023-10-22T08:42:54+03:00", "creator": "Microsoft® Word LTSC", "moddate": "2023-10-22T08:42:54+03:00", "page": 7, "page_label": "8", "producer": "Microsoft® Word LTSC", "source": "/content/Guide-to-Essential-Cybersecurity-Controls-(ECC)-Implementation.pdf", "total_pages": 180 }
1-8 المراجعة والتدقيق الدوري للأمن السيبراني Periodical Cybersecurity Review and Audit
{ "creationdate": "2023-10-22T08:42:54+03:00", "creator": "Microsoft® Word LTSC", "moddate": "2023-10-22T08:42:54+03:00", "page": 7, "page_label": "8", "producer": "Microsoft® Word LTSC", "source": "/content/Guide-to-Essential-Cybersecurity-Controls-(ECC)-Implementation.pdf", "total_pages": 180 }
1-9 الأمن السيبراني المتعلق بالموارد البشرية Cybersecurity in Human Resources
{ "creationdate": "2023-10-22T08:42:54+03:00", "creator": "Microsoft® Word LTSC", "moddate": "2023-10-22T08:42:54+03:00", "page": 7, "page_label": "8", "producer": "Microsoft® Word LTSC", "source": "/content/Guide-to-Essential-Cybersecurity-Controls-(ECC)-Implementation.pdf", "total_pages": 180 }
1-10 برنامج التوعية والتدريب بالأمن السيبراني Cybersecurity Awareness and Training Program 2 تعزيز الأمن السيبراني Cybersecurity Defense
{ "creationdate": "2023-10-22T08:42:54+03:00", "creator": "Microsoft® Word LTSC", "moddate": "2023-10-22T08:42:54+03:00", "page": 7, "page_label": "8", "producer": "Microsoft® Word LTSC", "source": "/content/Guide-to-Essential-Cybersecurity-Controls-(ECC)-Implementation.pdf", "total_pages": 180 }
2-1 إدارة الأصول Asset Management
{ "creationdate": "2023-10-22T08:42:54+03:00", "creator": "Microsoft® Word LTSC", "moddate": "2023-10-22T08:42:54+03:00", "page": 7, "page_label": "8", "producer": "Microsoft® Word LTSC", "source": "/content/Guide-to-Essential-Cybersecurity-Controls-(ECC)-Implementation.pdf", "total_pages": 180 }
2-2 إدارة هويات الدخول والصلاحيات Identity and Access Management
{ "creationdate": "2023-10-22T08:42:54+03:00", "creator": "Microsoft® Word LTSC", "moddate": "2023-10-22T08:42:54+03:00", "page": 7, "page_label": "8", "producer": "Microsoft® Word LTSC", "source": "/content/Guide-to-Essential-Cybersecurity-Controls-(ECC)-Implementation.pdf", "total_pages": 180 }
2-3 حماية الأنظمة وأجهزة معالجة المعلومات Information System and Processing Facilities Protection
{ "creationdate": "2023-10-22T08:42:54+03:00", "creator": "Microsoft® Word LTSC", "moddate": "2023-10-22T08:42:54+03:00", "page": 7, "page_label": "8", "producer": "Microsoft® Word LTSC", "source": "/content/Guide-to-Essential-Cybersecurity-Controls-(ECC)-Implementation.pdf", "total_pages": 180 }
2-4 حماية البريد الإلكتروني Email Protection
{ "creationdate": "2023-10-22T08:42:54+03:00", "creator": "Microsoft® Word LTSC", "moddate": "2023-10-22T08:42:54+03:00", "page": 7, "page_label": "8", "producer": "Microsoft® Word LTSC", "source": "/content/Guide-to-Essential-Cybersecurity-Controls-(ECC)-Implementation.pdf", "total_pages": 180 }
2-5 إدارة أمن الشبكات Networks Security Management
{ "creationdate": "2023-10-22T08:42:54+03:00", "creator": "Microsoft® Word LTSC", "moddate": "2023-10-22T08:42:54+03:00", "page": 7, "page_label": "8", "producer": "Microsoft® Word LTSC", "source": "/content/Guide-to-Essential-Cybersecurity-Controls-(ECC)-Implementation.pdf", "total_pages": 180 }
2-6 أمن الأجهزة المحمولة Mobile Devices Security
{ "creationdate": "2023-10-22T08:42:54+03:00", "creator": "Microsoft® Word LTSC", "moddate": "2023-10-22T08:42:54+03:00", "page": 7, "page_label": "8", "producer": "Microsoft® Word LTSC", "source": "/content/Guide-to-Essential-Cybersecurity-Controls-(ECC)-Implementation.pdf", "total_pages": 180 }
2-7 حماية البيانات والمعلومات Data and Information Protection
{ "creationdate": "2023-10-22T08:42:54+03:00", "creator": "Microsoft® Word LTSC", "moddate": "2023-10-22T08:42:54+03:00", "page": 7, "page_label": "8", "producer": "Microsoft® Word LTSC", "source": "/content/Guide-to-Essential-Cybersecurity-Controls-(ECC)-Implementation.pdf", "total_pages": 180 }
2-8 التشفير Cryptography
{ "creationdate": "2023-10-22T08:42:54+03:00", "creator": "Microsoft® Word LTSC", "moddate": "2023-10-22T08:42:54+03:00", "page": 7, "page_label": "8", "producer": "Microsoft® Word LTSC", "source": "/content/Guide-to-Essential-Cybersecurity-Controls-(ECC)-Implementation.pdf", "total_pages": 180 }
2-9 إدارة النسخ الاحتياطية Backup and Recovery Management
{ "creationdate": "2023-10-22T08:42:54+03:00", "creator": "Microsoft® Word LTSC", "moddate": "2023-10-22T08:42:54+03:00", "page": 7, "page_label": "8", "producer": "Microsoft® Word LTSC", "source": "/content/Guide-to-Essential-Cybersecurity-Controls-(ECC)-Implementation.pdf", "total_pages": 180 }
2-10 إدارة الثغرات Vulnerability Management
{ "creationdate": "2023-10-22T08:42:54+03:00", "creator": "Microsoft® Word LTSC", "moddate": "2023-10-22T08:42:54+03:00", "page": 7, "page_label": "8", "producer": "Microsoft® Word LTSC", "source": "/content/Guide-to-Essential-Cybersecurity-Controls-(ECC)-Implementation.pdf", "total_pages": 180 }
2-11 اختبار الاختراق Penetration Testing
{ "creationdate": "2023-10-22T08:42:54+03:00", "creator": "Microsoft® Word LTSC", "moddate": "2023-10-22T08:42:54+03:00", "page": 7, "page_label": "8", "producer": "Microsoft® Word LTSC", "source": "/content/Guide-to-Essential-Cybersecurity-Controls-(ECC)-Implementation.pdf", "total_pages": 180 }
2-12 إدارة سجلات الأحداث ومراقبة الأمن السيبراني Cybersecurity Event Logs and Monitoring Management
{ "creationdate": "2023-10-22T08:42:54+03:00", "creator": "Microsoft® Word LTSC", "moddate": "2023-10-22T08:42:54+03:00", "page": 7, "page_label": "8", "producer": "Microsoft® Word LTSC", "source": "/content/Guide-to-Essential-Cybersecurity-Controls-(ECC)-Implementation.pdf", "total_pages": 180 }
2-13 إدارة حوادث وتهديدات الأمن السيبراني Cybersecurity Incident and Threat management
{ "creationdate": "2023-10-22T08:42:54+03:00", "creator": "Microsoft® Word LTSC", "moddate": "2023-10-22T08:42:54+03:00", "page": 7, "page_label": "8", "producer": "Microsoft® Word LTSC", "source": "/content/Guide-to-Essential-Cybersecurity-Controls-(ECC)-Implementation.pdf", "total_pages": 180 }
2-14 الأمن المادي Physical Security
{ "creationdate": "2023-10-22T08:42:54+03:00", "creator": "Microsoft® Word LTSC", "moddate": "2023-10-22T08:42:54+03:00", "page": 7, "page_label": "8", "producer": "Microsoft® Word LTSC", "source": "/content/Guide-to-Essential-Cybersecurity-Controls-(ECC)-Implementation.pdf", "total_pages": 180 }
2-15 حماية تطبيقات الويب Web Application Security 3 صمود الأمن السيبراني Cybersecurity Resilience
{ "creationdate": "2023-10-22T08:42:54+03:00", "creator": "Microsoft® Word LTSC", "moddate": "2023-10-22T08:42:54+03:00", "page": 7, "page_label": "8", "producer": "Microsoft® Word LTSC", "source": "/content/Guide-to-Essential-Cybersecurity-Controls-(ECC)-Implementation.pdf", "total_pages": 180 }
3-1 جوانب صمود الأمن السيبراني في إدارة استمرارية الأعمال Cybersecurity Resilience Aspects of Business Continuity Management (BCM) 4 الأمن السيبراني المتعلق بالأطراف الخارجية والحوسبة السحابية Third-Party and Cloud Computing Cybersecurity
{ "creationdate": "2023-10-22T08:42:54+03:00", "creator": "Microsoft® Word LTSC", "moddate": "2023-10-22T08:42:54+03:00", "page": 7, "page_label": "8", "producer": "Microsoft® Word LTSC", "source": "/content/Guide-to-Essential-Cybersecurity-Controls-(ECC)-Implementation.pdf", "total_pages": 180 }
4-1 الأمن السيبراني المتعلق بالأطراف الخارجية Third-Party Cybersecurity
{ "creationdate": "2023-10-22T08:42:54+03:00", "creator": "Microsoft® Word LTSC", "moddate": "2023-10-22T08:42:54+03:00", "page": 7, "page_label": "8", "producer": "Microsoft® Word LTSC", "source": "/content/Guide-to-Essential-Cybersecurity-Controls-(ECC)-Implementation.pdf", "total_pages": 180 }
4-2 الأمن السيبراني المتعلق بالحوسبة السحابية والاستضافة Cloud Computing and Hosting Cybersecurity 5 الأمن السيبراني لأنظمة التحكم الصناعي ICS Cybersecurity
{ "creationdate": "2023-10-22T08:42:54+03:00", "creator": "Microsoft® Word LTSC", "moddate": "2023-10-22T08:42:54+03:00", "page": 7, "page_label": "8", "producer": "Microsoft® Word LTSC", "source": "/content/Guide-to-Essential-Cybersecurity-Controls-(ECC)-Implementation.pdf", "total_pages": 180 }
5-1 حماية أجهزة وأنظمة التحكم الصناعي Industrial Control Systems (ICS) Protection FIGURE 1: ECC DOMAINS AND SUBDOMAINS
{ "creationdate": "2023-10-22T08:42:54+03:00", "creator": "Microsoft® Word LTSC", "moddate": "2023-10-22T08:42:54+03:00", "page": 7, "page_label": "8", "producer": "Microsoft® Word LTSC", "source": "/content/Guide-to-Essential-Cybersecurity-Controls-(ECC)-Implementation.pdf", "total_pages": 180 }
Guide to Essential Cybersecurity Controls (ECC) Implementation 9 Document Classification: Public TLP: White Guide Structure Name of Main Domain Reference number of the Main Domain Reference No. of the Subdomain Name of Subdomain Objective Controls Control Reference No. Control Clauses Relevant cybersecurity tools: Control implementation guidelines: Expected deliverables: FIGURE 2: ECC STRUCTURE 1
{ "creationdate": "2023-10-22T08:42:54+03:00", "creator": "Microsoft® Word LTSC", "moddate": "2023-10-22T08:42:54+03:00", "page": 8, "page_label": "9", "producer": "Microsoft® Word LTSC", "source": "/content/Guide-to-Essential-Cybersecurity-Controls-(ECC)-Implementation.pdf", "total_pages": 180 }
1-1 Cybersecurity Strategy Objective To ensure that cybersecurity plans, goals, initiatives and projects are contributing to compliance with related laws and regulations. Controls 1-1-1 A cybersecurity strategy must be defined, documented and approved. It must be supported by the head of the organization or his/her delegate (refer red to in this document as Authorizing Official). The strategy goals must be in -line with related laws and regulations. Relevant cybersecurity tools: • All cybersecurity strategy models and roadmap Control implementation guidelines: • Conduct a workshop with stakeholders in the organization to align the objectives of the cybersecurity strategy with the organization's strategic objectives. • Develop and document cybersecurity the strategy of the organization in order to align the organization's cybersecurity strategic objectives with related laws and regulations, including but not limited to (CCC, CSCC). A cybersecurity strategy often includes the following: o Vision o Mission o Strategic Objectives o Strategy Implementation Plan o Projects o Initiatives • In order for the cybersecurity strategy of the organization to be effective, the approval of the representative must be based on the authority matrix approved by the organization Expected deliverables: Cybersecurity Governance 1
{ "creationdate": "2023-10-22T08:42:54+03:00", "creator": "Microsoft® Word LTSC", "moddate": "2023-10-22T08:42:54+03:00", "page": 9, "page_label": "10", "producer": "Microsoft® Word LTSC", "source": "/content/Guide-to-Essential-Cybersecurity-Controls-(ECC)-Implementation.pdf", "total_pages": 180 }
Guide to Essential Cybersecurity Controls (ECC) Implementation 11 Document Classification: Public TLP: White • The cybersecurity strategy document approved by the organization (electronic copy or official hard copy). • Initiatives and projects included in the cybersecurity strategy of the organization. 1-1-2 A roadmap must be executed to implement the cybersecurity strategy. Relevant cybersecurity tools • All cybersecurity strategy models and roadmap. • Cybersecurity performance report and measurement template. Control implementation guidelines • Develop a roadmap for implementing the cybersecurity strategy including the execution of the strategy's initiatives and projects to: o Define cybersecurity priorities. o Make recommendations related to cybersecurity works in the organization in a manner consistent with the nature of its work. o Monitor the implementation of cybersecurity strategy projects and initiatives and take corrective steps if necessary. o Ensure the implementation of initiatives and projects according to requirements. o Provide a clear and unified vi sion and communicate it to all internal and external stakeholders. o Obtain NCA's approval for any cybersecurity initiatives that are beyond the scope of the organization. Expected deliverables • Strategy implementation roadmap • List of cybersecurity projects and initiatives and their status 1-1-3 The cybersecurity strategy must be reviewed periodically according to planned intervals or upon changes to related laws and regulations. Control implementation guidelines: • Review and update the cybersecurity strategy periodically according to a documented and approved review plan as follows
{ "creationdate": "2023-10-22T08:42:54+03:00", "creator": "Microsoft® Word LTSC", "moddate": "2023-10-22T08:42:54+03:00", "page": 10, "page_label": "11", "producer": "Microsoft® Word LTSC", "source": "/content/Guide-to-Essential-Cybersecurity-Controls-(ECC)-Implementation.pdf", "total_pages": 180 }
1-2 Cybersecurity Management Objective cybersecurity programs within the organization as per related laws and regulations Controls 1-2-1 A dedicated cybersecurity function (e.g., division, department) must be established within the organization. This function must be independent from the Information Technology/Information Communication and Technology (IT/ICT) functions (as per the Royal Decree number 37140 dated 14/8/1438H). It is highly recommended that this cybersecurity function reports directly to the head of the organization or his/her delegate while ensuring that this does not result in a conflict of interest. Relevant cybersecurity tools • Cybersecurity Function Organizational Structure • Cybersecurity Roles and Responsibilities Template • Cybersecurity General Policy Template
{ "creationdate": "2023-10-22T08:42:54+03:00", "creator": "Microsoft® Word LTSC", "moddate": "2023-10-22T08:42:54+03:00", "page": 11, "page_label": "12", "producer": "Microsoft® Word LTSC", "source": "/content/Guide-to-Essential-Cybersecurity-Controls-(ECC)-Implementation.pdf", "total_pages": 180 }
Guide to Essential Cybersecurity Controls (ECC) Implementation 13 Document Classification: Public TLP: White Control implementation guidelines: • Establish a cybersecurity function within the organization to enable it to carry out its cybersecurity tasks as required, taking into account the following points o Ensure that the cybersecurity function's reporting line is different from that of the IT department or the digital transformation department, as per Royal Decree No. 37140 dated 14/8/1438H o Ensure that the cybersecurity function is reporting to the head of the organization or his/ her deputy/ assistant for the sectors concerned with regulation, including but not limited to, deputy/ assistant head of business sectors or regulatory sectors, or the agents and heads of business sectors in the organization o Ensure the following in order to avoid conflict of interest o The cybersecurity function is responsible for all cybersecurity monitoring activities (including compliance mo nitoring, operation monitoring, operations, etc.) o The cybersecurity function is responsible for all cybersecurity governance activities (including defining cybersecurity requirements, managing cybersecurity risks, etc.) Expected deliverables • The organization's organizational structure (electronic copy or official hard copy), covering the organizational structure of the cybersecurity function. • The decision to establish the Cybersecurity functions and its mandate (electronic copy or official hard copy) • Reports on the cybersecurity policies compliance results 1-2-2 The position of cybersecurity function head (e.g., CISO), and related supervisory and critical positions within the function, must be filled with full -time and experienced Saudi cybersecurity professionals. Control implementation guidelines: • Appoint full-time and highly qualified Saudi cybersecurity professionals to fill the following job roles and positions o Head of the cybersecurity function, who is responsible for leading the cybersecurity operations within the organization, setting the vision and direction for cybersecurity, strategies, resources and related
{ "creationdate": "2023-10-22T08:42:54+03:00", "creator": "Microsoft® Word LTSC", "moddate": "2023-10-22T08:42:54+03:00", "page": 12, "page_label": "13", "producer": "Microsoft® Word LTSC", "source": "/content/Guide-to-Essential-Cybersecurity-Controls-(ECC)-Implementation.pdf", "total_pages": 180 }
Guide to Essential Cybersecurity Controls (ECC) Implementation 14 Document Classification: Public TLP: White activities, and providing insights to the organiz ation's leadership regarding effective cybersecurity risk management methods for the organization. o Supervisory positions within the cybersecurity function (e.g., managers of departments and functions within the cybersecurity function as per the organizatio nal structure and/or the cybersecurity function governance and operating model approved by the authorization official), and in case there is a vacancy for any supervisory position, an employee is to be assigned to run the operations of the function or depa rtment until the supervisory position is filled as per an approved timeline. o Critical roles within the cybersecurity function that include responsibilities requiring confidentiality and integrity where if not performed as required, it would have negative i mpacts on the cybersecurity of the organization, its operations, and its systems while also considering the national laws and regulations related to nationalizing the cybersecurity positions within the organization, including direct or indirect employees and contractors (including, but not limited to, royal orders and decrees, orders issued by the Council of Ministers, and official circulars and regulatory orders issued by the National Cybersecurity Authority). The Saudi Cybersecurity Workforce Framework (S CyWF) can be utilized as reference regarding the job positions related to cybersecurity. • Define the required academic qualifications and years of experience to serve as the head of the cybersecurity function and the supervisory and critical job roles and positions. For example, but not limited to: o Developing a job description of the head of the cybersecurity function position to include the minimum required number of years of experience and related fields, and the appropriate academic qualifications, and appropriate training and professional certificates in the cybersecurity and technical fields relying on The Saudi Cybersecurity Workforce Framework (SCyWF) Expected deliverables: • A detailed list of all personnel (direct or indirect employees and contractors), whose work is related to cybersecurity, that includes names, nationality,
{ "creationdate": "2023-10-22T08:42:54+03:00", "creator": "Microsoft® Word LTSC", "moddate": "2023-10-22T08:42:54+03:00", "page": 13, "page_label": "14", "producer": "Microsoft® Word LTSC", "source": "/content/Guide-to-Essential-Cybersecurity-Controls-(ECC)-Implementation.pdf", "total_pages": 180 }
Guide to Essential Cybersecurity Controls (ECC) Implementation 15 Document Classification: Public TLP: White contractual type, position titles, job roles, years of experience, academic and professional qualifications. • Job descriptions of the head of the cybersecurity and the supervisory and critical positions related to cybersecurity relying on The Saudi Cybersecurity Workforce Framework (SCyWF). 1-2-3 A cybersecurity steering committee must be established by the Authorizing Official to ensure the support and implementation of the cybersecurity programs and initiatives within the organization. Committee members, roles and responsibilities, and governance framework must be defined, documented and approved. The committee must include the head of the cybersecurity function as one of its members. It is highly recommended that the committee reports directly to the head of the organization or his/her delegate while ensuring that this does not result in a conflict of interest. Relevant cybersecurity tools • Cybersecurity supervisory committee governance document template Control implementation guidelines: • Establish the cybersecurity supervisory committee as a committee specialized in directing and leading cybersecurity affairs, processes, programs, and initiatives in the organization. The committee's must be directly reporting to the organization's head or his/ her deput y, taking into account non -conflict of interests • Identify the members of the supervisory committee, where the cybersecurity supervisory committee includes members who influence or are influenced by the cybersecurity of the organization. Such members inclu de but are not limited to, the head of the organization or his/ her deputy, the head of the cybersecurity function, the head of the IT department, the head of the Compliance Department, the Head of the Human Resources Department. In addition, define the du ties and responsibilities of the supervisory committee and its business governance framework, and formally document them in the Committee's Charter. The Committee's charter must be approved by the organization's representative (head of organization or his/ her deputy) • Include the head of cybersecurity function as a permanent member of the committee • Conduct periodic meetings (based on the intervals specified in the committee's charter document). The periodic meetings cover ensuring follow- up on the impleme ntation of cybersecurity programs and regulations in the
{ "creationdate": "2023-10-22T08:42:54+03:00", "creator": "Microsoft® Word LTSC", "moddate": "2023-10-22T08:42:54+03:00", "page": 14, "page_label": "15", "producer": "Microsoft® Word LTSC", "source": "/content/Guide-to-Essential-Cybersecurity-Controls-(ECC)-Implementation.pdf", "total_pages": 180 }
1-3 Cybersecurity Policies and Procedures Objective To ensure that cybersecurity requirements are documented, communicated and complied with by the organization as per related laws and regulations, and organizational requirements. Controls 1-3-1 Cybersecurity policies and procedures must be defined and documented by the cybersecurity function, approved by the Authorizing Official, and disseminated to relevant parties inside and outside the organization. Relevant cybersecurity tools • All policies, procedures, and standard controls templates included within cybersecurity toolkit Control implementation guidelines: • Define and document cybersecurity requirements in cybersecurity policies, procedures, and standard controls, and approve them by the organization's representative based on the authority matrix approved by the organization
{ "creationdate": "2023-10-22T08:42:54+03:00", "creator": "Microsoft® Word LTSC", "moddate": "2023-10-22T08:42:54+03:00", "page": 15, "page_label": "16", "producer": "Microsoft® Word LTSC", "source": "/content/Guide-to-Essential-Cybersecurity-Controls-(ECC)-Implementation.pdf", "total_pages": 180 }
Guide to Essential Cybersecurity Controls (ECC) Implementation 17 Document Classification: Public TLP: White • Ensure the communication of policies and procedures to the organization's personnel and internal and external stakeholders. Such communication must be done through the approved comm unication channels as per the scope specified in the policy ( e.g., publishing policies and procedures through the organization's internal portal, or publishing policies and procedures by e - mail) Expected deliverables • All cybersecurity policies, procedures, and standard controls documented and approved by the organization's representative or his/ her deputy • Communicate cybersecurity policies, procedures, and standard controls to personnel and stakeholders 1-3-2 The cybersecurity function must ensure that the cybersecurity policies and procedures are implemented. Relevant cybersecurity tools • A template of personnel acknowledgment and approval to follow the cybersecurity policies • A template of personnel acknowledgment and approval to maintain information confidentiality Control implementation guidelines: • Develop an action plan to implement cybersecurity policies, procedures, and standard controls . Such plan must include all internal and external stakeholders, to whom the organization's policies, procedures, and standard controls apply. Such stakeholders must be followed - up and monitored periodically to ensure the full and effective implementation of all requirements • The cybersecurity function must ensu re the implementation of cybersecurity controls and adherence to the approved and documented cybersecurity policies, procedures, and standard controls • Ensure the implementation of cybersecurity policies, procedures, and standard controls , including controls and requirements, manually or electronically (automated) Expected deliverables • An action plan to implement the cybersecurity policies and procedures of the organization
{ "creationdate": "2023-10-22T08:42:54+03:00", "creator": "Microsoft® Word LTSC", "moddate": "2023-10-22T08:42:54+03:00", "page": 16, "page_label": "17", "producer": "Microsoft® Word LTSC", "source": "/content/Guide-to-Essential-Cybersecurity-Controls-(ECC)-Implementation.pdf", "total_pages": 180 }
Guide to Essential Cybersecurity Controls (ECC) Implementation 18 Document Classification: Public TLP: White • A report that outlines the review of the implementation of cybersecurity policies and procedures 1-3-3 The cybersecurity policies and procedures must be supported by technical security standards (e.g., operating systems, databases and firewall technical security standards). Relevant cybersecurity tools • A template of all standard controls included in cybersecurity tools. Control implementation guidelines: • Define, document, and approve technical standard controls to cover the organization's information and technology assets (e.g., firewall technical security standard controls , network devi ces, databases, server operating systems, BYOD operating systems, secure development standard, cryptography standard, etc.). • Communicate the technical standard controls to the relevant departments in the organization ( e.g., IT department) and ensure that they are applied periodically to information and technology assets Expected deliverables • The organization's approved technical cybersecurity standard controls documents 1-3-4 The cybersecurity policies and procedures must be reviewed periodically according to planned intervals or upon changes to related laws and regulations. Changes and reviews must be approved and documented. Control implementation guidelines: • Review the cybersecurity policies, procedures, and standard controls in the organization periodically according to a documented and approved plan for review and based on a period specified in the policy (e.g., periodic review must be conducted annually) • Review and update the cybersecurity policies, procedures, and standard controls in the organization in the event of changes in the relevant laws and regulations (for example, when a new cybersecurity law is issued that applies to the organization). • Document the review and changes to the cybersecurity policies, procedures, and standard controls and approve them by the head of the organization or his/her deputy
{ "creationdate": "2023-10-22T08:42:54+03:00", "creator": "Microsoft® Word LTSC", "moddate": "2023-10-22T08:42:54+03:00", "page": 17, "page_label": "18", "producer": "Microsoft® Word LTSC", "source": "/content/Guide-to-Essential-Cybersecurity-Controls-(ECC)-Implementation.pdf", "total_pages": 180 }
1-4 Cybersecurity Roles and Responsibilities Objective To ensure that roles and responsibilities are defined for all parties participating in implementing the cybersecurity controls within the organization. Controls 1-4-1 Cybersecurity organizational structure and related roles and responsibilities must be defined, documented, approved, supported and assigned by the Authorizing Official while ensuring that this does not result in a conflict of interest. Relevant cybersecurity tools • Cybersecurity Roles and Responsibilities Template Control implementation guidelines: • Define and document cybersecurity roles and responsibilities and inform and ensure all parties involved in the implementation of cybersecurity controls at the organization of their responsibilit ies in implementing cybersecurity programs and requirements • Support the organizational structure, roles, and responsibilities of the organization by the executive management This must be done through the approval of the representative • Include the following roles and responsibilities (but not limited to) o Roles and responsibilities related to the cybersecurity supervisory committee
{ "creationdate": "2023-10-22T08:42:54+03:00", "creator": "Microsoft® Word LTSC", "moddate": "2023-10-22T08:42:54+03:00", "page": 18, "page_label": "19", "producer": "Microsoft® Word LTSC", "source": "/content/Guide-to-Essential-Cybersecurity-Controls-(ECC)-Implementation.pdf", "total_pages": 180 }
Guide to Essential Cybersecurity Controls (ECC) Implementation 20 Document Classification: Public TLP: White o Roles and responsibilities related to the head of the cybersecurity function o Roles and responsibilities related to t he cybersecurity function ( e.g., develop and update cybersecurity policies and standard controls , conduct cybersecurity risk assessment, conduct compliance checks on cybersecurity policies and legislation, monitor cybersecurity events, assess vulnerabiliti es, manage access, develop and implement cybersecurity awareness programs, etc.) o Roles and responsibilities related to cybersecurity for other departments in the organization (e.g., IT, personnel, physical security, etc.) o Cybersecurity roles and responsibilities for all personnel • Assign roles and responsibilities to the organization's personnel, taking into consideration the non-conflict of interests Expected deliverables: • Cybersecurity Function Organizational Structure Document • The organization's approved cybersecurity roles and responsibilities document (electronic copy or official hard copy) • A document that clarifies the assignment of cybersecurity roles and responsibilities to the organization's personnel 1-4-2 The cybersecurity roles and responsibilities must be reviewed periodically according to planned intervals or upon changes to related laws and regulations. Control implementation guidelines • Review the cybersecurity roles and responsibilities in the organization periodically according to a documented and approved plan for review and based on a planned interval ( e.g., periodic review must be conducted annually) • Review and update the cybersecurity roles and responsibilities in the organization in the event of changes in the relevant laws and regulations (for example, when a new cybersecurity law is issued that applies to the organization) • Document the review and changes to the cybersecurity requirements related to cybersecurity roles and responsibilities and appro ve them by the representative
{ "creationdate": "2023-10-22T08:42:54+03:00", "creator": "Microsoft® Word LTSC", "moddate": "2023-10-22T08:42:54+03:00", "page": 19, "page_label": "20", "producer": "Microsoft® Word LTSC", "source": "/content/Guide-to-Essential-Cybersecurity-Controls-(ECC)-Implementation.pdf", "total_pages": 180 }
1-5 Cybersecurity Risk Management Objective To ensure managing cybersecurity risks in a methodological approach in order to protect the policies and procedures, and related laws and regulations. Controls 1-5-1 Cybersecurity risk management methodology and procedures must be defined, documented and approved as per confidentiality, integrity and availability considerations of information and technology assets. Relevant cybersecurity tools • Cybersecurity Risk Management Policy Template. • Cybersecurity Risk Management Procedures Template. Control implementation guidelines: • Define and document cybersecurity risk management requirements which are based on relevant regulations, best practices, and standard controls of cybersecurity risk management, taking into account the confidentiality, availability, and integrity of information and technology assets to cover the following o The methodology and procedures of cybersecurity risk management in the organization must include - Identification of assets and their value - Identification of risks to the business, assets, or personnel of the organization
{ "creationdate": "2023-10-22T08:42:54+03:00", "creator": "Microsoft® Word LTSC", "moddate": "2023-10-22T08:42:54+03:00", "page": 20, "page_label": "21", "producer": "Microsoft® Word LTSC", "source": "/content/Guide-to-Essential-Cybersecurity-Controls-(ECC)-Implementation.pdf", "total_pages": 180 }
Guide to Essential Cybersecurity Controls (ECC) Implementation 22 Document Classification: Public TLP: White - Risk assessment, so that the likelihood and impact of the identified risks are defined - Risk response, where cyber risk treatment methods are identified - Risk monitoring, so that the risk register is updated after each risk assessment and response plan • Support the cybersecurity risk management methodology and procedures in the organization by the Executive Management through the approval of the representative Expected deliverables • The approved cybersecurity risk management methodology (electronic copy or official hard copy) • Approved cybersecurity risk management procedures 1-5-2 The cybersecurity risk management methodology and procedures must be implemented by the cybersecurity function. Relevant cybersecurity tools • Cybersecurity Risk Management Register Template Control implementation guidelines: • Implement all requirements of the cybersecurity risk management methodology and procedures adopted by the organization • Establish a cybersecurity risk register to document and monitor risks • Develop plans to address cybersecurity risks of the organization Expected deliverables • Cybersecurity Risk Register of the organization • Cybersecurity Risk Treatment Plan of the organization • A report that outlines the cybersecurity risk assessment and monitoring 1-5-3 The cybersecurity risk assessment procedures must be implemented at least in the following cases: 1-5-3-1 Early stages of technology projects. Control implementation guidelines:
{ "creationdate": "2023-10-22T08:42:54+03:00", "creator": "Microsoft® Word LTSC", "moddate": "2023-10-22T08:42:54+03:00", "page": 21, "page_label": "22", "producer": "Microsoft® Word LTSC", "source": "/content/Guide-to-Essential-Cybersecurity-Controls-(ECC)-Implementation.pdf", "total_pages": 180 }
Guide to Essential Cybersecurity Controls (ECC) Implementation 23 Document Classification: Public TLP: White • Define and document the requirements of this ECC in the cybersecurity requirements document and approve them by the representative • Include cybersecurity requirements within the first phase of the information and technology projects lifecycle (Technical Project Lifecycle) within the organization • Implement cybersecurity risk assessment procedures at an early stage of technical projects to avoid events or circumstances that could compromise the confidentiality, inte grity, and availability of information and technology assets, including, in particular, the identification of information and technology assets in technology projects, potential exposure to threats, and relevant vulnerabilities. • Remediate all cybersecurity risks in accordance with the approved cybersecurity risk management methodology. Expected deliverables • A report that outlines the identification, assessment, and remediation of cybersecurity risks throughout the technical project lifecycle in the organization 1-5-3-2 Before making major changes to technology infrastructure. Control implementation guidelines: • Define and document the requirements of this ECC in the cybersecurity requirements document and approve them by the representative • Include cybersecurity requirements within the IT Change Management lifecycle in the organization • Implement cybersecurity risk assessment procedures before making a material change in the technology architecture to avoid events or circumstances that could compromise the confidentiality, integrity, and availability of information and technology assets, including, in particular, the identification of information and technology assets in technology projects, potential exposure to threats, and relevant vulnerabilities . These changes include, but are not limited to: a basic and sensitive update to one or several systems in the network, such as database systems, or a radical change in network mapping • Remediate all cybersecurity risks in accordance with the approved cybersecurity risk management methodology Expected deliverables
{ "creationdate": "2023-10-22T08:42:54+03:00", "creator": "Microsoft® Word LTSC", "moddate": "2023-10-22T08:42:54+03:00", "page": 22, "page_label": "23", "producer": "Microsoft® Word LTSC", "source": "/content/Guide-to-Essential-Cybersecurity-Controls-(ECC)-Implementation.pdf", "total_pages": 180 }
Guide to Essential Cybersecurity Controls (ECC) Implementation 24 Document Classification: Public TLP: White • A report that outlines the identification, assessment, and remediation of the cybersecurity risks of material changes to the production environment of the organization's information and technology assets 1-5-3-3 During the planning phase of obtaining third party services. Control implementation guidelines: • Define and document the requirements of this ECC in the cybersecurity requirements document and approve them by the representative • Include cybersecurity requirements within the third -party, contracts, and procurement management procedures in the organization • Implement cybersecu rity risk assessment procedures when planning to acquire services from a third party. to avoid events or circumstances that could compromise the confidentiality, integrity, and availability of information and technology assets, including, in particular, th e identification of information and technology assets in technology projects, potential exposure to threat s, and relevant vulnerabilities • Remediate all cybersecurity risks in accordance with the approved cybersecurity risk management methodology. Expected deliverables • A report that outlines the identification, assessment, and remediation of third- party cybersecurity risks that provide outsourcing services to IT or managed services 1-5-3-4 During the planning phase and before going live for new technology services and products. Control implementation guidelines: • Define and document the requirements of this ECC in the cybersecurity requirements document and approve them by the representative • Include cybersecurity requirements within the Release Management procedures in the organization • Implement cybersecurity risk assessment procedures at the planning stage and before the release of new technology products and services to avoid events or circumstances that could compromise the confidentiality, integrity, and availability of information and technology assets, including, in particular, the
{ "creationdate": "2023-10-22T08:42:54+03:00", "creator": "Microsoft® Word LTSC", "moddate": "2023-10-22T08:42:54+03:00", "page": 23, "page_label": "24", "producer": "Microsoft® Word LTSC", "source": "/content/Guide-to-Essential-Cybersecurity-Controls-(ECC)-Implementation.pdf", "total_pages": 180 }
Guide to Essential Cybersecurity Controls (ECC) Implementation 25 Document Classification: Public TLP: White identification of information and technology assets in technology projects, potential exposure to threats, and relevant vulnerabilities. • Remediate all cybersecurity risks in accordance with the approved cybersecurity risk management methodology. Expected deliverables • A report that outlines the identification, assessment, and remediation of cybersecurity risks in the planning stage and before releasing new technical products and services in the production environment 1-5-4 The cybersecurity risk management methodology and procedures must be reviewed periodically according to planned intervals or upon changes to related laws and regulations. Changes and reviews must be approved and documented. Control implementation guidelines • Review and update the cybersecurity risk management methodology and procedures and cybersecurity risk management requirements in the organization periodically according to a documented and approved plan for review and based on a planned interval ( e.g., periodic review must be conducted annually) • Review and update the cybersecurity risk management methodology and procedures and cybersecurity risk management requirements in the organization in the event of changes in the relevant laws and regulations (for example, when a new cybersecurity law is issued that applies to the organization) • Document the review and changes to the cybersecurity requirements related to cybersecurity risk management methodology an d procedures and approve them by the representative Expected deliverables • An approved document that defines the review schedule for the cybersecurity risk management methodology and procedures • Cybersecurity risk methodology and procedures indicating that they have been reviewed and updated, and that changes have been documented and approved by the representative
{ "creationdate": "2023-10-22T08:42:54+03:00", "creator": "Microsoft® Word LTSC", "moddate": "2023-10-22T08:42:54+03:00", "page": 24, "page_label": "25", "producer": "Microsoft® Word LTSC", "source": "/content/Guide-to-Essential-Cybersecurity-Controls-(ECC)-Implementation.pdf", "total_pages": 180 }
1-6 Cybersecurity in Information and Technology Project Management Objective To ensure that cybersecurity requirements are included in project management methodology and procedures in order to protect the confidentiality, integrity and availability of information and technology assets as per organization policies and procedures, and related laws and regulations. Controls 1-6-1 Cybersecurity requirements must be included in project and asset (information/ technology) change management methodology and procedures to identify and manage cybersecurity risks as part of project management lifecycle. The cybersecurity requirements must be a key part of the overall requirements of technology projects. Relevant cybersecurity tools • Secure Software Development Cycle Policy Template. • Secure Software Development Cycle Procedure Template. Control implementation guidelines: • Include cybersecurity requirements in the project management methodology and procedures and in the change management of the information and technology assets in the organization to ensure that cybersecurity risks are identified and addressed. Such requirements include o Assess and detect vulnerabilities before the deployment of services or systems online, or upon any change to systems within Information and Technology Project Management o Fix identified vulnerabilities before launching projects and changes o Review Secure Configuration and Hardening and Patching and address observations identified before launching projects and changes o Define the requirements for connection with cyber surveillance systems • Support cybersecurity requirements of the project management methodology and procedures by the Executive Management through the approval of the head of the organization or his/ her deputy Expected deliverables • Project Management Methodology Document in the organization • Change management methodology or procedures in the organization's information and technology assets document
{ "creationdate": "2023-10-22T08:42:54+03:00", "creator": "Microsoft® Word LTSC", "moddate": "2023-10-22T08:42:54+03:00", "page": 25, "page_label": "26", "producer": "Microsoft® Word LTSC", "source": "/content/Guide-to-Essential-Cybersecurity-Controls-(ECC)-Implementation.pdf", "total_pages": 180 }
Guide to Essential Cybersecurity Controls (ECC) Implementation 27 Document Classification: Public TLP: White 1-6-2 The cybersecurity requirements in project and assets (information/technology) change management must include at least the following: 1-6-2-1 Vulnerability assessment and remediation Control implementation guidelines: • Define and document the requirements of this control in the cybersecurity requirements document and approve them by the representative • Define systems, services, and technology components subject to Vulnerabilities Assessment within the scope of technical projects and change requests • Develop and adopt procedures for the implementation of Vulnerabilities Assessment and remediation in accordance with related laws and regulations • Conduct Vulnerabilities Assessment before launching technical projects in the production environment and assess it in a timely manner and address it effectively. • Conduct Vulnerabilities Assessment before the implementation of changes to the production environment and assess it in a timely manner and address it effectively. Expected deliverables • A document (such as approved policy or procedure) indicating the identification and documentation of the requirements related to this control • A report that outlines the assessment and remediation of cybersecurity vulnerabilities throughout the technical project lifecycle and changes to information and technology assets 1-6-2-2 Conducting a configurations ’ review, secure configuration and hardening and patching before changes or going live for technology projects. Relevant cybersecurity tools • Cybersecurity Requirements Checklist Template for Project Management and Changes to Information and Technology Assets. • Cybersecurity Requirements Checklist Template for Application Development. Control implementation guidelines: • Define and document the requirements of this ECC in the cybersecurity requirements document and approve them by the representative
{ "creationdate": "2023-10-22T08:42:54+03:00", "creator": "Microsoft® Word LTSC", "moddate": "2023-10-22T08:42:54+03:00", "page": 26, "page_label": "27", "producer": "Microsoft® Word LTSC", "source": "/content/Guide-to-Essential-Cybersecurity-Controls-(ECC)-Implementation.pdf", "total_pages": 180 }
Guide to Essential Cybersecurity Controls (ECC) Implementation 28 Document Classification: Public TLP: White • Define systems, services, and technology components subject to Secure Configuration and Hardening review within the scope of technical projects and change requests • Provide technical Security Standard controls for systems, services, and technology components subject to Secure Configuration and Hardening review • Develop and adopt procedures for the implementation of Secure Configuration and Hardening review in accordance with the relevant laws and regulations • Review secure Configuration and Hardening and Patching before launching technology projects in the production environment • Review secure Configuration and Hardening and Patching before implementing changes to the production environment Expected deliverables • A document (such as approved policy or procedure) indicating the identification and documentation of the requirements related to this control • Technical Security Standard controls for systems, services, and technology components subject to Secure Configuration and Hardening review • A report that outlines the assessment and review of Secure Configuration and Hardening throughout the technical project lifecycle and changes to information and technology assets in the organization before launching projects and implementing changes 1-6-3 The cybersecurity requirements related to software and application development projects must include at least the following: 1-6-3-1 Using secure coding standards. Relevant cybersecurity tools • Secure Coding Standard Template. Control implementation guidelines: • Define and document the requirements of this ECC in the cybersecurity requirements document and approve them by the representative • Define and document technical cybersecurity requirements for Secure Coding Standard controls (covering all phases of the secure coding process) based on relevant laws and regulations, best practices and standard controls related to the development and protection of software and applications against internal
{ "creationdate": "2023-10-22T08:42:54+03:00", "creator": "Microsoft® Word LTSC", "moddate": "2023-10-22T08:42:54+03:00", "page": 27, "page_label": "28", "producer": "Microsoft® Word LTSC", "source": "/content/Guide-to-Essential-Cybersecurity-Controls-(ECC)-Implementation.pdf", "total_pages": 180 }
Guide to Essential Cybersecurity Controls (ECC) Implementation 29 Document Classification: Public TLP: White and external threats in the organization to minimize cyber risks and focus on key security objectives namely; confidentiality, integrity, and availability • Communicate Secure Coding Standard controls to the relevant departments in the organization ( e.g., IT department) and their implementation periodically Expected deliverables • A document (such as approved policy or procedure) indicating the identification and documentation of the requirements related to this control • Secure Coding Standard controls approved by the organization • Documents that confirm the implementation of Secure Coding Standard controls to information and technology assets 1-6-3-2 Using trusted and licensed sources for software development tools and libraries. Control implementation guidelines: • Define and document the requirements of this ECC in the cybersecurity requirements document and approve them by the representative • Use only modern, reliable and licensed sources for software development tools and libraries Expected deliverables • A document (such as approved policy or procedure) indicating the identification and documentation of the requirements related to this control • An updated list of licensed and documented software used for application development tools and libraries 1-6-3-3 Conducting compliance test for software against the defined organizational cybersecurity requirements. Relevant cybersecurity tools • Cybersecurity Requirements Checklist Template for Application Development. Control implementation guidelines: • Define and document the requirements of this ECC in the cybersecurity requirements document and approve them by the representative • Conduct testing to verify that applications meet the cybersecurity requirements of the organizations, such as penetration te sting, to ensure that
{ "creationdate": "2023-10-22T08:42:54+03:00", "creator": "Microsoft® Word LTSC", "moddate": "2023-10-22T08:42:54+03:00", "page": 28, "page_label": "29", "producer": "Microsoft® Word LTSC", "source": "/content/Guide-to-Essential-Cybersecurity-Controls-(ECC)-Implementation.pdf", "total_pages": 180 }
Guide to Essential Cybersecurity Controls (ECC) Implementation 30 Document Classification: Public TLP: White cybersecurity controls are applied to the development of secure coding standard controls and detect weaknesses, vulnerabilities, and issues in software • Access Management requirements for users and review the cybersecurity architecture Expected deliverables • A document (such as approved policy or procedure) indicating the identification and documentation of the requirements related to this control • List of application development projects and list of security tests performed to verify the comprehensiveness of the tests and the extent to which the applications meet the organization's cybersecurity requirements and implementation reports 1-6-3-4 Secure integration between software components. Control implementation guidelines • Define and document the requirements of this ECC in the cybersecurity requirements document and approve them by the representative • Ensure security of integration between applications by, but not limited to, security testing of various integration technologies, including o Perform System Integration Testing (SIT) o Perform API testing Expected deliverables • A document (such as approved policy or procedure) indicating the identification and documentation of the requirements related to this control • A report that outlines the testing and assessment of secure Integration between applications based on the organization's cybersecurity requirements and implementation reports 1-6-3-5 Conducting a configurations ’ review, secure configuration and hardening and patching before going live for software products. Control implementation guidelines: • Define and document the requirements of this ECC in the cybersecurity requirements document and approve them by the representative • Review secure Configuration and Hardening and Patching before launching applications and ensure their implementation in the following cases
{ "creationdate": "2023-10-22T08:42:54+03:00", "creator": "Microsoft® Word LTSC", "moddate": "2023-10-22T08:42:54+03:00", "page": 29, "page_label": "30", "producer": "Microsoft® Word LTSC", "source": "/content/Guide-to-Essential-Cybersecurity-Controls-(ECC)-Implementation.pdf", "total_pages": 180 }
Guide to Essential Cybersecurity Controls (ECC) Implementation 31 Document Classification: Public TLP: White o Secure Configuration and Hardening of i nformation and technology assets and applications must be reviewed periodically and their implementation according to the approved technical security standard controls must be ensured o Secure configuration and hardening must be reviewed before launching projects and changes in information and technology assets o Secure Configuration and Hardening must be reviewed before launching applications • Approve the Image for the Secure configuration and hardening of information and technology assets in accordance with the technical security standard controls and kept it in a safe place • Provide technology required to centrally manage Secure Configuration and Hardening and ensure the automated implementation or update of Secure Configuration and Hardening for all information and technology assets at pre-determined regular intervals Expected deliverables • A document (such as approved policy or procedure) indicating the identification and documentation of the requirements related to this control • Reports or evidence that Secure Configuration and Hardening and patching are reviewed before launching applications • Reports or evidence that Secure Configuration and Hardening and patching are periodically reviewed 1-6-4 The cybersecurity requirements in project management must be reviewed periodically. Control implementation guidelines • Review the cybersecurity project management requirements periodically according to a documented and approved plan for review and based on a planned interval (e.g., periodic review must be conducted annually) • Document the review and changes to the cybersecurity requirements for project management in the organization and approve them by the head of the organization or his/her deputy Expected deliverables
{ "creationdate": "2023-10-22T08:42:54+03:00", "creator": "Microsoft® Word LTSC", "moddate": "2023-10-22T08:42:54+03:00", "page": 30, "page_label": "31", "producer": "Microsoft® Word LTSC", "source": "/content/Guide-to-Essential-Cybersecurity-Controls-(ECC)-Implementation.pdf", "total_pages": 180 }
1-7 Compliance with Cybersecurity Standard controls, Laws and Regulations Objective To ensure laws and regulations. Controls 1-7-1 The organization must comply with related national cybersecurity laws and regulations. Relevant cybersecurity tools • Compliance with Cybersecurity Standard controls, Laws and Regulations Policy Template. Control implementation guidelines: • Work with stakeholders in the organization (i.e., legal function and governance and compliance function) to identify, document, and periodically update a list of national cybersecurity laws and regulations and related the National Cybersecurity Authority (NCA) (which might include, but not limited to, royal orders and decrees, orders issued by the Council of Ministers, and official circulars and regulatory orders issued by the National Cybersecurity Authority (NCA)). • Ensure compliance with all national cybersecurity laws and regulations requirements referred to in the previous point. • Provide necessary technologies; to verify compliance with national cybersecurity laws and regulations • national cybersecurity laws and regulations to be submitted to t he National Cybersecurity Authority (NCA) whenever requested. Expected deliverables
{ "creationdate": "2023-10-22T08:42:54+03:00", "creator": "Microsoft® Word LTSC", "moddate": "2023-10-22T08:42:54+03:00", "page": 31, "page_label": "32", "producer": "Microsoft® Word LTSC", "source": "/content/Guide-to-Essential-Cybersecurity-Controls-(ECC)-Implementation.pdf", "total_pages": 180 }
1-8 Periodical Cybersecurity Review and Audit
{ "creationdate": "2023-10-22T08:42:54+03:00", "creator": "Microsoft® Word LTSC", "moddate": "2023-10-22T08:42:54+03:00", "page": 32, "page_label": "33", "producer": "Microsoft® Word LTSC", "source": "/content/Guide-to-Essential-Cybersecurity-Controls-(ECC)-Implementation.pdf", "total_pages": 180 }
Guide to Essential Cybersecurity Controls (ECC) Implementation 34 Document Classification: Public TLP: White Objective To ensure that cybersecurity controls are implemented and in compliance with organizational policies and procedures, as well as related national and international laws, regulations and agreements. Controls 1-8-1 Cybersecurity reviews must be conducted periodically by the cybersecurity function in the organization to assess the compliance with the cybersecurity controls in the organization. Relevant cybersecurity tools • Cybersecurity Review and Audit Template. • Cybersecurity Review and Audit Log Template. Control implementation guidelines: • Review the implementation of cybersecurity requirements at the organization by the cybersecurity function periodically according to a documented and approved plan for review and based on a period specified in the policy ( e.g., quarterly review), to ensure that the cybersecurity controls of the organization are effectively implemented and operate in accordance with the regulatory policies and procedures of the organization, the national laws and regulations, and the international requirements approved by the organization Expected deliverables • A document (such as approved policy or procedure) indicating the identification and documentation of the requirements related to this control • Approved plan to review the implementation of cybersecurity controls • Documents that confirm the implementation of Cybersecurity Standard controls to information, technology, and physical assets • Periodic review reports of cybersecurity controls implementation in the organization 1-8-2 Cybersecurity audits and reviews must be conducted by independent parties outside the cybersecurity function (e.g., Internal Audit function) to assess the compliance with the cybersecurity controls in the organization. Audits and reviews must be conducted independently, while ensuring that this does not result in a conflict of
{ "creationdate": "2023-10-22T08:42:54+03:00", "creator": "Microsoft® Word LTSC", "moddate": "2023-10-22T08:42:54+03:00", "page": 33, "page_label": "34", "producer": "Microsoft® Word LTSC", "source": "/content/Guide-to-Essential-Cybersecurity-Controls-(ECC)-Implementation.pdf", "total_pages": 180 }
Guide to Essential Cybersecurity Controls (ECC) Implementation 35 Document Classification: Public TLP: White interest, as per the Generally Accepted Auditing Standard controls (GAAS), and related laws and regulations. Relevant cybersecurity tools • Cybersecurity Review and Audit Template. • Cybersecurity Review and Audit Log Template. Control implementation guidelines: • Review and audit cybersecurity controls implementation at the organization by parties independent of the cybersecurity function, such as the internal audit department, or by third parties that cooperated with independently from the relevant cybersecurity function to achieve the principle of non -conflict of interests when reviewing the implementation of all cybersecurity requirements in the organization • Perform the review periodically according to a documented and approved plan for review and based on a period specified in the policy (e.g., review must be conducted annually), in order to ensure that the organization's cybersecurity controls are effectively implemented and operate in accordance with the regulatory policies and procedures of the organization, the national laws and regulations approved by NCA, and the international requirements approved by the organization Expected deliverables • A document (such as approved policy or procedure) indicating the identification and documentation of the requirements related to this control • Approved plan to review and audit the implementation of cybersecurity controls • Audit reports (by the internal audit department or an independent external auditor) on all cybersecurity requirements of the organization 1-8-3 Results from the cybersecurity audits and reviews must be documented and presented to the cybersecurity steering committee and Authorizing Official. Results must include the audit/review scope, observations, recommendations and remediation plans. Relevant cybersecurity tools • Cybersecurity Review Report Template.
{ "creationdate": "2023-10-22T08:42:54+03:00", "creator": "Microsoft® Word LTSC", "moddate": "2023-10-22T08:42:54+03:00", "page": 34, "page_label": "35", "producer": "Microsoft® Word LTSC", "source": "/content/Guide-to-Essential-Cybersecurity-Controls-(ECC)-Implementation.pdf", "total_pages": 180 }
1-9 Cybersecurity in Human Resources Objective To ensure that cybersecurity risks and requirements related to personnel (employees and contractors) are managed efficiently prior to employment, during employment and after termination/separation as per organizational policies and procedures, and related laws and regulations. Controls 1-9-1 Personnel cybersecurity requirements (prior to employment, during employment and after termination/separation) must be defined, documented and approved. Relevant cybersecurity tools • Human Resources Cybersecurity Policy Template Control implementation guidelines:
{ "creationdate": "2023-10-22T08:42:54+03:00", "creator": "Microsoft® Word LTSC", "moddate": "2023-10-22T08:42:54+03:00", "page": 35, "page_label": "36", "producer": "Microsoft® Word LTSC", "source": "/content/Guide-to-Essential-Cybersecurity-Controls-(ECC)-Implementation.pdf", "total_pages": 180 }
Guide to Essential Cybersecurity Controls (ECC) Implementation 37 Document Classification: Public TLP: White • Define and document personnel cybersecurity requirements in the cybersecurity requirements document and approved by the representativ e Requirements include, but are not limited to o Include cybersecurity responsibilities and non -disclosure clauses in the contracts of employees in the organization (to cover the periods during and after the end/termination of the job relationship with the organization) o Conduct screening or vetting for the personnel of cybersecurity functions, technical functions with privileged access, and critical systems functions • Ensure the comprehensiveness of the cybersecurity requirements related to employees during the employee's lifecycle in the organization, i ncluding the following requirements o Cybersecurity requirements prior to recruitment o Cybersecurity requirements during work o Cybersecurity requirements upon completion or termination of work • Support the organization's policy by the Executive Management This must be done through the approval of the organization head or his/ her deputy Expected deliverables • Cybersecurity policy for human resources approved by the representative 1-9-2 The personnel cybersecurity requirements must be implemented. Control implementation guidelines: • Implement all personnel -related cybersecurity requirements that have been identified, documented and approved in the Human Resources Cybersecurity Policy • Develop an action plan to implement cybersecurity requirements related to the personnel of the organization • Include personnel cybersecurity requirements in the organization's HR procedures to ensure compliance with cybersecurity requirements for all internal and external stakeholders Expected deliverables • Documents that confirm the implementation of cybersecurity requirements related to personnel as documented in the HR Cybersecurity Policy • Cybersecurity Function Personnel Contract Forms (signed copy)
{ "creationdate": "2023-10-22T08:42:54+03:00", "creator": "Microsoft® Word LTSC", "moddate": "2023-10-22T08:42:54+03:00", "page": 36, "page_label": "37", "producer": "Microsoft® Word LTSC", "source": "/content/Guide-to-Essential-Cybersecurity-Controls-(ECC)-Implementation.pdf", "total_pages": 180 }
Guide to Essential Cybersecurity Controls (ECC) Implementation 38 Document Classification: Public TLP: White • Screening or vetting requests for the personnel of cybersecurity functions and technical functions with privileged access 1-9-3 The personnel cybersecurity requirements prior to employment must include at least the following: 1-9-3-1 Inclusion of personnel cybersecurity responsibilities and non -disclosure clauses (covering the cybersecurity requirements during employment and after termination/ separation) in employment contracts. Relevant cybersecurity tools • Acknowledgment and confidentiality templates Control implementation guidelines: • Define and document the requirements of this ECC in the cybersecurity requirements document and approve them by the representative • Work with relevant departments to include cybersecurity responsibilities and non-disclosure clauses in the contracts of employees in the organization (to cover the periods during and after the end/termination of the job relationship with the organization) • Include such requirements in the organization's HR procedures to ensure compliance with cybersecurity requirements for all internal and external stakeholders Expected deliverables • A document (such as approved policy or procedure) indicating the identification and documentation of the requirements related to this control • Organization personnel contract forms (signed copy) • Cybersecurity Function Personnel Contract Forms (signed copy) 1-9-3-2 Screening or vetting candidates of cybersecurity and critical/privileged positions. Control implementation guidelines: • Define and document the requirements of this ECC in the cybersecurity requirements document and approve them by the representative • Work with relevant departments to ensure Screening or Vetting of all employees in cybersecurity functions
{ "creationdate": "2023-10-22T08:42:54+03:00", "creator": "Microsoft® Word LTSC", "moddate": "2023-10-22T08:42:54+03:00", "page": 37, "page_label": "38", "producer": "Microsoft® Word LTSC", "source": "/content/Guide-to-Essential-Cybersecurity-Controls-(ECC)-Implementation.pdf", "total_pages": 180 }
Guide to Essential Cybersecurity Controls (ECC) Implementation 39 Document Classification: Public TLP: White • Work with relevant departments to ensure the Screening or Vetting of all employees working in technical functions with privileged access, including database management personnel, firewall management personnel, and systems management personnel • Include such requirements in the organization's HR procedures to ensure compliance with cybersecurity requirements for all internal and external stakeholders Expected deliverables • A document (such as approved policy or procedure) indicating the identification and documentation of the requirements related to this control • Evidence that the Screening or Vetting of employees working in cybersecurity functions and technical functions with privileged access was performed, including but not limited to o An official document from the relevant authorities indicating the performance of Screening or Vetting 1-9-4 The personnel cybersecurity requirements during employment must include at least the following: 1-9-4-1 Cybersecurity awareness (during on-boarding and during employment). Control implementation guidelines: • Define and document the requirements of this ECC in the cybersecurity requirements document and approve them by the representative • Work with relevant departments to provide cybersecurity awareness at the beginning and during work through the organization's approved communication channels • Include such requirem ents in the organization's HR procedures to ensure compliance with cybersecurity requirements for all internal and external stakeholders • Support the organization's policy by the Executive Management This must be done through the approval of the representative Expected deliverables • A document (such as approved policy or procedure) indicating the identification and documentation of the requirements related to this control
{ "creationdate": "2023-10-22T08:42:54+03:00", "creator": "Microsoft® Word LTSC", "moddate": "2023-10-22T08:42:54+03:00", "page": 38, "page_label": "39", "producer": "Microsoft® Word LTSC", "source": "/content/Guide-to-Essential-Cybersecurity-Controls-(ECC)-Implementation.pdf", "total_pages": 180 }
Guide to Essential Cybersecurity Controls (ECC) Implementation 40 Document Classification: Public TLP: White • Documents that confirm the provision of awareness content to employees in cybersecurity before work at the organization and providing them with access through e-mails, workshops, or any other means, including but not limited to o Review cybersecurity awareness messages shared with employees through emails o Review of content presented in the workshop o Review the cybersecurity awareness plan 1-9-4-2 Implementation of and compliance with the cybersecurity requirements as per the organizational cybersecurity policies and procedures. Control implementation guidelines: • Define and document the requirements of this ECC in the cybersecurity requirements document and approve them by the representative • Inform all employees of the organization and obtain their approval on the cybersecurity policies and procedures, in order to educate the organization's employees of the importance of their role in implementing the cybersecurity requirements • Include personnel cybersecurity requirements in the organization's HR procedures to ensure compliance with cybersecurity requirements for all internal and external stakeholders Expected deliverables • A document (such as approved policy or procedure) indicating the identification and documentation of the requirements related to this control. • An acknowledgment form for approving cybersecurity policies by one of the organization's employees (signed copy) 1-9-5 Personnel access to information and technology assets must be reviewed and removed immediately upon termination/separation. Control implementation guidelines • Define and document the requirements of this ECC in the cybersecurity requirements document and approve them by the representative • Review access of employees and revoke it immediately after the end/termination of their professional service at the organization, which may include the following
{ "creationdate": "2023-10-22T08:42:54+03:00", "creator": "Microsoft® Word LTSC", "moddate": "2023-10-22T08:42:54+03:00", "page": 39, "page_label": "40", "producer": "Microsoft® Word LTSC", "source": "/content/Guide-to-Essential-Cybersecurity-Controls-(ECC)-Implementation.pdf", "total_pages": 180 }
1-10 Cybersecurity Awareness and Training Program Objective To ensure that personnel are aware of their cybersecurity responsibilities and have the essential cybersecurity awareness. It is also to ensure that personnel are provided with the required cybersecurity training, skills and credentials needed to accomplish
{ "creationdate": "2023-10-22T08:42:54+03:00", "creator": "Microsoft® Word LTSC", "moddate": "2023-10-22T08:42:54+03:00", "page": 40, "page_label": "41", "producer": "Microsoft® Word LTSC", "source": "/content/Guide-to-Essential-Cybersecurity-Controls-(ECC)-Implementation.pdf", "total_pages": 180 }
Guide to Essential Cybersecurity Controls (ECC) Implementation 42 Document Classification: Public TLP: White technology assets. Controls 1-10-1 A cybersecurity awareness program must be developed and approved. The program must be conducted periodically through multiple channels to strengthen the awareness about cybersecurity, cyber threats and risks, and to build a positive cybersecurity awareness culture. Relevant cybersecurity tools • Awareness program template. • Awareness content template for all employees. • Awareness content form for supervisory and executive positions. • Information and Technology Assets Operators Awareness Content Form. Control implementation guidelines: • Develop and approve cybersecurit y awareness program and plan in the organization through multiple channels periodically, including but not limited to o Awareness emails. o Cybersecurity awareness workshops o Distribution of awareness publications o Awareness presentation through billboards o Launch of a cybersecurity training and awareness platform • The program may include a plan to coordinate with the Human Resources department, the Media and Internal Communications department, and the cybersecurity function to raise awareness of cybersecurity, its threats and risks, and build a positive cybersecurity culture • The organization's program must be supported by the Executive Management This must be done through the approval of the representative. Expected deliverables • The awareness program document approved by the organization 1-10-2 The cybersecurity awareness program must be implemented. Control implementation guidelines:
{ "creationdate": "2023-10-22T08:42:54+03:00", "creator": "Microsoft® Word LTSC", "moddate": "2023-10-22T08:42:54+03:00", "page": 41, "page_label": "42", "producer": "Microsoft® Word LTSC", "source": "/content/Guide-to-Essential-Cybersecurity-Controls-(ECC)-Implementation.pdf", "total_pages": 180 }
Guide to Essential Cybersecurity Controls (ECC) Implementation 43 Document Classification: Public TLP: White • Implement the approved cybersecurity awareness and training program in coordination with the cybersecurity awareness and training department, which may include the following o Implement the approved cybersecurity awareness program in the organization, including but not limited to sending awareness emails or conducting cybersecurity awareness workshops o Evaluate cybersecurity awareness of all personnel and define and address cybersecurity weaknesses Expected deliverables • Action plan to implement the cybersecurity awareness program adopted by the organization • Awareness programs to be shared with employees • List of beneficiaries of awareness programs 1-10-3 The cybersecurity awareness program must cover the latest cyber threats and how to protect against them, and must include at least the following subjects: 1-10-3-1 Secure handling of email services, especially phishing emails. Control implementation guidelines: • Define and document the requirements of this ECC in the cybersecurity requirements document and approve them by the representative • Provide cybersecurity awareness programs that cover the safe handling of e - mail services, especially with emails and social engineering Expected deliverables • A document (such as approved policy or procedure) indicating the identification and documentation of the requirements related to this control • Action plan to implement the cybersecurity awareness program adopted by the organization • Evidence of providing awareness content for the safe handling of e -mail services, especially with phishing emails 1-10-3-2 Secure handling of mobile devices and storage media. Control implementation guidelines: • Define and document the requirements of this ECC in the cybersecurity requirements document and approve them by the representative
{ "creationdate": "2023-10-22T08:42:54+03:00", "creator": "Microsoft® Word LTSC", "moddate": "2023-10-22T08:42:54+03:00", "page": 42, "page_label": "43", "producer": "Microsoft® Word LTSC", "source": "/content/Guide-to-Essential-Cybersecurity-Controls-(ECC)-Implementation.pdf", "total_pages": 180 }
Guide to Essential Cybersecurity Controls (ECC) Implementation 44 Document Classification: Public TLP: White • Provide cybersecurity awareness programs to cover the safe handling of mobile devices and storage media Expected deliverables • A document (such as approved policy or procedure) indicating the identification and documentation of the requirements related to this control • Action plan to implement the cybersecurity awareness program adopted by the organization • Evidence that awareness content is provided for the safe handling of mobile devices and storage media 1-10-3-3 Secure Internet browsing. Control implementation guidelines: • Define and document the requirements of this ECC in the cybersecurity requirements document and approve them by the representative • Provide cybersecurity awareness programs that cover the safe handling of internet browsing services, especially dealing with suspicious websites such as phantom phishing sites and suspicious websites and links Expected deliverables • A document (such as approved policy or procedure) indicating the identification and documentation of the requirements related to this control • Action plan to implement the cybersecurity awareness program adopted by the organization • Evidence that awareness content is provided for the secure handling of internet browsing services 1-10-3-4 Secure use of social media. Control implementation guidelines: • Define and document the requirements of this ECC in the cybersecurity requirements document and approve them by the representative • Provide cybersecurity awareness programs that cover the safe handling of social media Expected deliverables
{ "creationdate": "2023-10-22T08:42:54+03:00", "creator": "Microsoft® Word LTSC", "moddate": "2023-10-22T08:42:54+03:00", "page": 43, "page_label": "44", "producer": "Microsoft® Word LTSC", "source": "/content/Guide-to-Essential-Cybersecurity-Controls-(ECC)-Implementation.pdf", "total_pages": 180 }
Guide to Essential Cybersecurity Controls (ECC) Implementation 45 Document Classification: Public TLP: White • A document (such as approved policy or procedure) indicating the identification and documentation of the requirements related to this control • Action plan to implement the cybersecurity awareness program adopted by the organization • Evidence that awareness content is provided for safe handling of social media 1-10-4 Essential and customized (i.e., tailored to job functions as it relates to cybersecurity) training and access to professional skillsets must be made available to personnel working directly on tasks related to cybersecurity including: 1-10-4-1 Control implementation guidelines: • Define and document the requirements of this ECC in the cybersecurity requirements document and approve them by the representative • Develop and implement an approved cybersecurity training plan for employees of the cybersecurity function in coordination with the training department in the organization, which may include the following o Implement the cybersecurity training plan for the organization in coordination with the Training and Employee Development Department o Assist in the establishment of cybersecurity career paths to allow career progression, deliberate development, and growth within and between cybersecurity career fields o Support in advocating for adequate funding for cybersecurity training resources, to include both internal and industry -provided courses, instructors, and related materials Expected deliverables • A document (such as approved policy or procedure) indicating the identification and documentation of the requirements related to this control • Approved training plans and programs for the cybersecurity department employees at the organization • Cybersecurity training certificates 1-10-4-2 Personnel working on software/application development. and information and technology assets operations. Control implementation guidelines:
{ "creationdate": "2023-10-22T08:42:54+03:00", "creator": "Microsoft® Word LTSC", "moddate": "2023-10-22T08:42:54+03:00", "page": 44, "page_label": "45", "producer": "Microsoft® Word LTSC", "source": "/content/Guide-to-Essential-Cybersecurity-Controls-(ECC)-Implementation.pdf", "total_pages": 180 }
Guide to Essential Cybersecurity Controls (ECC) Implementation 46 Document Classification: Public TLP: White • Define and document the requirements of this ECC in the cybersecurity requirements document and approve them by the representative • Develop and implement an approved training plan in the field of secure program and application development, and the safe management of the organization's information and technology assets for relevant employees in coordination with the training department in the organization. This may include the following o Training plan to develop programs, applications and employees operating the organization's information and technology assets must be implemented in coordination with Training and Employee Development Department o Assistance in defining career paths for software and application developers and the employees operating the organization's information and technology assets must be provided to allow for professional growth and upgrades in professional areas related to software development • Provide support in requesting the adequate funding of training resources related to the development of programs, applications and employees operating the organization's information and technology assets, including internal and sector-related courses, trainers and related materials Expected deliverables • A document (such as approved policy or procedure) indicating the identification and documentation of the requirements related to this control • Approved training programs for employees involved in the development of programs, applications, and employees operating the organization's information and technology assets • Training certificates in software and application development 1-10-4-3 Executive and supervisory positions. Control implementation guidelines: • Define and document the requirements of this ECC in the cybersecurity requirements document and approve them by the representative • Develop and implement an approved cybersecurity training plan for employees of the cybersecurity Supervisory and executive functions in coordination with the training department in the organization, which may include the following
{ "creationdate": "2023-10-22T08:42:54+03:00", "creator": "Microsoft® Word LTSC", "moddate": "2023-10-22T08:42:54+03:00", "page": 45, "page_label": "46", "producer": "Microsoft® Word LTSC", "source": "/content/Guide-to-Essential-Cybersecurity-Controls-(ECC)-Implementation.pdf", "total_pages": 180 }
Guide to Essential Cybersecurity Controls (ECC) Implementation 47 Document Classification: Public TLP: White o Awareness of the importance of cybersecurity, developing the cybersecurity culture and the key risks and threats, such as phishing emails for supervisory and executive positions (Whale phishing) must be conducted o Training plan for supervisory and executive positi ons in the organization must be implemented in coordination with the Training and Employee Development Department o Assistance in the establishment of cybersecurity career paths to allow career progression, deliberate development, and growth within and between cybersecurity career fields must be provided o Support in advocating for adequate funding for cybersecurity training resources, including both internal and industry -provided courses, instructors, and related materials must be provided Expected deliverables • A document (such as approved policy or procedure) indicating the identification and documentation of the requirements related to this control • Security training programs dedicated to supervisory and executive positions in the organization • Training certificates in supervisory and executive positions 1-10-5 The implementation of the cybersecurity awareness program must be reviewed periodically. Control implementation guidelines: • Review the cybersecurity requirements of cybersecurity awareness and training programs by conducting a periodic assessment (according to a documented and approved plan for review and based on a planned interval (e.g., quarterly) ) to implement awareness and training plans by the Cybersecurity function and in cooperation with relevant departments (such as the Awareness and Training Department) • Conduct application review through traditional channels ( e.g., email) or automated channels using a compliance management system The organization may develop a review plan explaining the cybersecurity requirements implementation review schedule for cybersecurity awareness and training programs Expected deliverables
{ "creationdate": "2023-10-22T08:42:54+03:00", "creator": "Microsoft® Word LTSC", "moddate": "2023-10-22T08:42:54+03:00", "page": 46, "page_label": "47", "producer": "Microsoft® Word LTSC", "source": "/content/Guide-to-Essential-Cybersecurity-Controls-(ECC)-Implementation.pdf", "total_pages": 180 }
Guide to Essential Cybersecurity Controls (ECC) Implementation 48 Document Classification: Public TLP: White • Results of cybersecurity awareness program implementation review in the organization • A document that defines the cybersecurity awareness and training implementation review cycle (Compliance Assessment Schedule) • Compliance assessment report that shows the assessment of the implementation of cybersecurity requirements for cybersecurity awareness and training programs
{ "creationdate": "2023-10-22T08:42:54+03:00", "creator": "Microsoft® Word LTSC", "moddate": "2023-10-22T08:42:54+03:00", "page": 47, "page_label": "48", "producer": "Microsoft® Word LTSC", "source": "/content/Guide-to-Essential-Cybersecurity-Controls-(ECC)-Implementation.pdf", "total_pages": 180 }
2-1 Asset Management Objective To ensure that the organization has an accurate and detailed inventory of information operational requirements to maintain the confidentiality, integrity and availability of information and technology assets. Controls 2-1-1 Cybersecurity requirements for managing information and technology assets must be defined, documented and approved. Relevant cybersecurity tools • Asset Management Policy Template. Control implementation guidelines: • Develop and document cybersecurity requirements for information and technology assets management in the organization, including the following o The cybersecurity requirements for types and description of information and technology asset management must be identified o Information and technology asset classification levels requirements in terms of data included and processed, and the criticality of the technology asset from a cybersecurity perspective must be defined o Requirements for the d efined stages of the information and technology assets life cycle ( including but not limited to: preservation, processing, storage, destruction, etc.) must be defined o Roles and responsibilities requirements for the ownership and management of information and technology assets must be defined • Support the organization's developed requirements by the Executive Management This must be done through the approval of the representative Expected deliverables 2 Cybersecurity Defense
{ "creationdate": "2023-10-22T08:42:54+03:00", "creator": "Microsoft® Word LTSC", "moddate": "2023-10-22T08:42:54+03:00", "page": 48, "page_label": "49", "producer": "Microsoft® Word LTSC", "source": "/content/Guide-to-Essential-Cybersecurity-Controls-(ECC)-Implementation.pdf", "total_pages": 180 }
Guide to Essential Cybersecurity Controls (ECC) Implementation 50 Document Classification: Public TLP: White • Information asset management cybersecurity requirements (in form of policy or standard) approved by the organization (e.g., electronic copy or official hard copy) • Formal approval by the head of the organization or his/her deputy on the requirements (e.g., via the organization's official e -mail, paper or electronic signature) 2-1-2 The cybersecurity requirements for managing information and technology assets must be implemented. Control implementation guidelines: • All cybersecurity requirements to manage information and technology assets of the organization, which may include the following o Approved cybersecurity requirements for the management of information and technology assets in the organization must be implemented, including but not limited to, classifying all information and technology assets of the organization, documenting and approving them in an approved and official document ( e.g., a documented record for the management of the organization's information and technology assets), as well as encoding all information and technology assets of the organization based on the approved classification of the organization's information and technology assets o Specific procedures for dealing with assets based on their classification and in accordance with the relevant laws and regulations must be established. Expected deliverables: • Documents that confirm the implementation of cybersecurity requirements related to information and technology asset management as documented in the policy • An action plan to implement the cybersecurity requirements of information and technology assets management • A documented and up-to-date record of all information and technology assets (e.g., Excel spreadsheet or displayed through automated means using solutions such as CMDB) must be provided • Specific procedures for dealing with assets based on their classification and in accordance with the relevant laws and regulations.
{ "creationdate": "2023-10-22T08:42:54+03:00", "creator": "Microsoft® Word LTSC", "moddate": "2023-10-22T08:42:54+03:00", "page": 49, "page_label": "50", "producer": "Microsoft® Word LTSC", "source": "/content/Guide-to-Essential-Cybersecurity-Controls-(ECC)-Implementation.pdf", "total_pages": 180 }
Guide to Essential Cybersecurity Controls (ECC) Implementation 51 Document Classification: Public TLP: White 2-1-3 Acceptable use policy of information and technology assets must be defined, documented and approved. Relevant cybersecurity tools • Asset Acceptable Use Policy Template. Control implementation guidelines: • Develop acceptable use policy for information and technology assets of the organization, which may include the following o Set of specific regulations for access to and use of assets. o A set of clear examples of unacceptable use. o Consequences if defined rules of acceptable use of assets are breached o The method used to monitor adherence to the defined rules of acceptable use of the organization's information and technology assets • Acceptable use policy of the organization's information and technology assets must be communicated to all employees and stakeholders in the organization through, including but not lim ited to the official email or through the organization's website • Support the organization's policy by the Executive Management This must be done through the approval of the organization head or his/ her deputy Expected deliverables: • Approved policy that covers the requirements for acceptable use of the organization's information and technology assets ( e.g., electronic copy or official hard copy) • Acceptable use policy of the organization's information and technology assets must be communicated to all employees and stakeholders in the organization through, including but not limited to the official email or through the organization's website. Evidence that all employees and stakeholders are aware and informed must be provided • Formal approval by the head of the organization or his/her deputy on the policy (e.g., via the organization's official e-mail, paper or electronic signature) 2-1-4 Acceptable use policy of information and technology assets must be implemented. Control implementation guidelines:
{ "creationdate": "2023-10-22T08:42:54+03:00", "creator": "Microsoft® Word LTSC", "moddate": "2023-10-22T08:42:54+03:00", "page": 50, "page_label": "51", "producer": "Microsoft® Word LTSC", "source": "/content/Guide-to-Essential-Cybersecurity-Controls-(ECC)-Implementation.pdf", "total_pages": 180 }
Guide to Essential Cybersecurity Controls (ECC) Implementation 52 Document Classification: Public TLP: White • Cybersecurity policy for the acceptable use policy of the information and technology assets of the organization must be implemented, including the following o Requirements for the acceptable use of information and technology assets by the organization must be implemented, including but not limited to: requesting each employee view and approve the Acceptable Use Policy of information and technology assets o These requirements must be communicated through the organizat ion's approved communication channels to educate the organization's internal and external stakeholders to implement these requirements o Appropriate mechanisms and techniques must be developed to monitor violations of the Acceptable Use Policy requirements and warn of disciplinary actions in the event of violations Expected deliverables: • An action plan to implement the acceptable use requirements of information and technology assets of the organization • Evidence of communicating these requirements through the communication channels approved by the organization • A completed and approved form that clarifies the approval of the Acceptable Use Policy by all organization's employees ( e.g., scanned physical copy, digital platform, or official hard copy) 2-1-5 Information and technology assets must be classified, labeled and handled as per related law and regulatory requirements. Control implementation guidelines: • Define and document the requirements of this ECC in the cybersecurity requirements of information and technology assets management at the organization and must be approved by the representative • Work with the concerned departments to identify all information and technology assets, including (but not limited to) o Infrastructure (e.g., servers) o Applications and services o Networks (e.g., router) o Workstations
{ "creationdate": "2023-10-22T08:42:54+03:00", "creator": "Microsoft® Word LTSC", "moddate": "2023-10-22T08:42:54+03:00", "page": 51, "page_label": "52", "producer": "Microsoft® Word LTSC", "source": "/content/Guide-to-Essential-Cybersecurity-Controls-(ECC)-Implementation.pdf", "total_pages": 180 }
Guide to Essential Cybersecurity Controls (ECC) Implementation 53 Document Classification: Public TLP: White o Peripherals (e.g., printers) o Operating systems (if any) • Document all information and technology assets in a single register with characteristics such as (asset name, description, owner and criticality) • Work with asset owners to identify, document and approve asset classification in the register in accordance with the relevant laws and regulations • Work with the concerned departments to ensure the coding of assets based on their classification, including but not limited to labelling the assets or automatically coding them through modern systems • Work with the concerned departments to ensure that asse ts are handled according to the defined and approved classification level and based on the approved procedures for dealing with each asset Expected deliverables: • A cybersecurity policy that covers the information and technology asset management requirements of the organization (e.g., electronic copy or official hard copy) • Formal approval by the head of the organization or his/her deputy on the policy (e.g., via the organization's official e-mail, paper or electronic signature) • A document that outlines the method and system of asset classification, coding and requirements • An action plan to implement the requirements of classification and coding of information and technology assets (Labelling) in accordance with the r elevant laws and regulations. • An up -to-date register that includes all information and technology assets, indicating the level of classification for each asset ( e.g., Excel or through automated means using technical solutions such as CMDB) • Evidence that outlines that the organization's assets are classified according to the defined and approved classification level • Evidence that outlines that the organization's assets have been labelled according to the classification level defined and based on but not limited to the coding labels that demonstrate the coding of all assets within the organization • Evidence of the implementation of controls on the organization's assets in accordance with their classification level, including but not limited to the procedures followed when dealing with each asset based on its classification
{ "creationdate": "2023-10-22T08:42:54+03:00", "creator": "Microsoft® Word LTSC", "moddate": "2023-10-22T08:42:54+03:00", "page": 52, "page_label": "53", "producer": "Microsoft® Word LTSC", "source": "/content/Guide-to-Essential-Cybersecurity-Controls-(ECC)-Implementation.pdf", "total_pages": 180 }
2-2 Identity and Access Management
{ "creationdate": "2023-10-22T08:42:54+03:00", "creator": "Microsoft® Word LTSC", "moddate": "2023-10-22T08:42:54+03:00", "page": 53, "page_label": "54", "producer": "Microsoft® Word LTSC", "source": "/content/Guide-to-Essential-Cybersecurity-Controls-(ECC)-Implementation.pdf", "total_pages": 180 }
Guide to Essential Cybersecurity Controls (ECC) Implementation 55 Document Classification: Public TLP: White Objective To ensure the secure and restricted logical access to information and technology assets in order to prevent unauthorized access and allow only authorized access for users which are necessary to accomplish assigned tasks. Controls 2-2-1 Cybersecurity requirements for identity and access management must be defined, documented and approved. Relevant cybersecurity tools • Identity and Access Management Policy Template. Control implementation guidelines: • Develop and document cybersecurity policy for identity and access management in the organization, which may include, but is not limited to o Grant access, including - Access to user accounts - Privileged Access to accounts - Remote access to the organization's networks and systems - Define and approve the authority of each type of users o Revoke and Change Access. o Review Identity and Access o Manage passwords • Support the organization's policy by the Executive Management This must be done through the approval of the representative Expected deliverables: • Cybersecurity policy that covers Identity and Access Management ( e.g., electronic copy or official hard copy) • Formal approval by the head of the organization or his/her deputy on the policy (e.g., via the organization's official e-mail, paper or electronic signature) 2-2-2 The cybersecurity requirements for identity and access management must be implemented.
{ "creationdate": "2023-10-22T08:42:54+03:00", "creator": "Microsoft® Word LTSC", "moddate": "2023-10-22T08:42:54+03:00", "page": 54, "page_label": "55", "producer": "Microsoft® Word LTSC", "source": "/content/Guide-to-Essential-Cybersecurity-Controls-(ECC)-Implementation.pdf", "total_pages": 180 }
Guide to Essential Cybersecurity Controls (ECC) Implementation 56 Document Classification: Public TLP: White Control implementation guidelines: • All cybersecurity requirements must be implemented for the organization's approved identity and access management procedures. It is also recommended that the identity and access management cover the following, but not limited to o User Authentication based on user login management. o Password management based on the organization's password policy o User authorization management based on a need -to-know and Need - to-use basis. o User authorization management based on least privilege and Segregation of Duties o Remote access management to the organization's networks. o Access Cancellation and Update Management. Expected deliverables: • Action plan for cybersecurity requirements for Identity and Access Management • Evidence that the identity and access management controls must be implemented on all technical and information assets in the organization, including but not limited to, the configuration of all technical information systems in line with the cybersecurity controls and requirements of identity and access management 2-2-3 The cybersecurity requirements for identity and access management must include at least the following 2-2-3-1 User authentication based on username and password. Control implementation guidelines: • Define and document the requirements of this ECC in the cybersecurity requirements of identity and access management at the organization and must be approved by the representative • Ensure all employees have a unique identifier, which may be a job number, employee name, or other naming mechanisms to ensure that usernames are unique
{ "creationdate": "2023-10-22T08:42:54+03:00", "creator": "Microsoft® Word LTSC", "moddate": "2023-10-22T08:42:54+03:00", "page": 55, "page_label": "56", "producer": "Microsoft® Word LTSC", "source": "/content/Guide-to-Essential-Cybersecurity-Controls-(ECC)-Implementation.pdf", "total_pages": 180 }
Guide to Essential Cybersecurity Controls (ECC) Implementation 57 Document Classification: Public TLP: White • Prepare password standard co ntrols taking into consideration best practices, including but not limited to o Expiration Period o Complexity o Lockout o Activation o Password History o A secure mechanism to create a password and provide it to the user Expected deliverables • Cybersecurity policy that covers Identity and Access Management ( e.g., electronic copy or official hard copy) • Password management policy in the organization ( e.g., electronic copy or official hard copy) • Formal approval by the head of the organization or system owner or his/her deputy on such policies ( e.g., via the organization's official e -mail, paper or electronic signature) • Evidence that the identity and access management controls must be implemented on all technical and information assets in the orga nization, including but not limited to, the configuration of all technical information systems in line with the cybersecurity controls and requirements of identity and access management 2-2-3-2 Multi-factor authentication for remote access. Control implementation guidelines: • Define and document the requirements of this ECC in the cybersecurity requirements of identity and access management at the organization and must be approved by the representative • Develop procedures for remote access with Multi-Factor Authentication • Provide appropriate and advanced multi-factor authentication techniques and link them to remote access technologies (e.g., VPN) must be ensured • Use two of the following authentication elements to apply multi -factor authentication o Something you know, e.g., using the password
{ "creationdate": "2023-10-22T08:42:54+03:00", "creator": "Microsoft® Word LTSC", "moddate": "2023-10-22T08:42:54+03:00", "page": 56, "page_label": "57", "producer": "Microsoft® Word LTSC", "source": "/content/Guide-to-Essential-Cybersecurity-Controls-(ECC)-Implementation.pdf", "total_pages": 180 }
Guide to Essential Cybersecurity Controls (ECC) Implementation 58 Document Classification: Public TLP: White o Something you have, e.g., using One time password through SMS or applications o Something you are, e.g., using biometrics such as fingerprint or face recognition Expected deliverables • Cybersecurity policy that covers Identity and Access Management ( e.g., electronic copy or official hard copy) • Formal approval by the head of the organization or his/her deputy on the policy (e.g., via the organization's official e-mail, paper or electronic signature) • Evidence that outlines the implementation of multi -factor authentication requirements to remote access, including but not limited to a screenshot showing the configuration of systems to ensure that the multi -factor authentication request for remote access is verified 2-2-3-3 User authorization based on identity and access control principles: Need-to- Know and Need-to-Use, Least Privilege and Segregation of Duties. Control implementation guidelines: • Define and document the requirements of this ECC in the cybersecurity requirements of identity and access management at the organization and must be approved by the representative • Define basic authorizations for all organization's employees, such as the authority to use email, internal portal, and human resources system • Define and document the requirements of this ECC in the cybersecurity requirements of identity and access management at the organization and must be approved by the representative. • Manage user authorization to all information and technology assets in the organization via an automated centralized access control system such as Active Directory • Develop and adopt specific procedures for granting powers to employees in the organization, as there are requirements to request authority, including o Applicant information (identity) o Details of the authority in question (explanation of authority and assets involved) o Description of Business Requirements for authorization
{ "creationdate": "2023-10-22T08:42:54+03:00", "creator": "Microsoft® Word LTSC", "moddate": "2023-10-22T08:42:54+03:00", "page": 57, "page_label": "58", "producer": "Microsoft® Word LTSC", "source": "/content/Guide-to-Essential-Cybersecurity-Controls-(ECC)-Implementation.pdf", "total_pages": 180 }
Guide to Essential Cybersecurity Controls (ECC) Implementation 59 Document Classification: Public TLP: White o Time required for authorization o Approvals required (e.g., Line Manager approval) Expected deliverables • Cybersecurity policy that covers Identity and Access Management ( e.g., electronic copy or official hard copy) • Evidence that outlines the implementation of User authorization management requirements, including but not limited to a screenshot showing the configuration of systems to ensure the implementation of user authorization management based on a Need to Know and Need to Use basis and least privilege and Segregation of Duties 2-2-3-4 Privileged access management. Control implementation guidelines: • Define and document the requirements of this ECC in the cybersecurity requirements of identity and access management at the organization and must be approved by the representative • Define privileged access at the level of infrastructure, networks, and applications in the organization. • Identify Personnel with Privileged Access. • Develop Privileged Access Management procedures by the organization, taking into account the following o Privileged accounts must not be used for normal daily tasks, and a normal user account must be used for this purpose o Privileged accounts must not be used for internet access. o Privileged accounts must not be used for email access o Privileged accounts must not be restricted for remote access o Default accounts must be disabled/ deleted. o Workstation protection system must be installed and updated on the workstation that will be used to access privileged accounts. o Secure versions of operating systems used in the organization must be built and prepared in a secure manner. o Protection programs must be installed and unused services must be disabled These copies must be used to configure desktops and servers.
{ "creationdate": "2023-10-22T08:42:54+03:00", "creator": "Microsoft® Word LTSC", "moddate": "2023-10-22T08:42:54+03:00", "page": 58, "page_label": "59", "producer": "Microsoft® Word LTSC", "source": "/content/Guide-to-Essential-Cybersecurity-Controls-(ECC)-Implementation.pdf", "total_pages": 180 }
Guide to Essential Cybersecurity Controls (ECC) Implementation 60 Document Classification: Public TLP: White • Define modern and advanced technologies and mechanisms for the Privileged Access Management • Grant privileged access based on functional duties after obtaining the necessary approvals, taking into consideration the principle of segregation of duties • Continuously monitor cybersecurity event logs for privileged accounts Expected deliverables • Privileged Access Management Policy in the organization (e.g., electronic copy or official hard copy) • Formal approval by the head of the organization or his/her deputy on the policy (e.g., via the organization's official e-mail, paper or electronic signature) • Evidence that outlines the implementation of privileged access management requirements, including but not limited to a screenshot sh owing the configuration of systems to ensure that administrators are granted privileged access 2-2-3-5 Control implementation guidelines: • Define and document the requirements of this ECC in the cybersecurity requirements of identity and access management at the organization and must be approved by the representative • Define privileged access at the level of infrastructure, networks, and applications in the organization. • Identify Personnel with Privileged Access. • Develop a plan for periodic review of identity and access as follows o Across all applications in the organization o Network level o Infrastructure and servers level o Workstations level • Review authorities in collaboration with IT department and application managers to revoke access in the following cases (e.g., limited to) o Access has not been used for a long period of time (e.g., over 3 months) o Access causes conflict of interest o The employee's need for access has not been confirmed by his manager
{ "creationdate": "2023-10-22T08:42:54+03:00", "creator": "Microsoft® Word LTSC", "moddate": "2023-10-22T08:42:54+03:00", "page": 59, "page_label": "60", "producer": "Microsoft® Word LTSC", "source": "/content/Guide-to-Essential-Cybersecurity-Controls-(ECC)-Implementation.pdf", "total_pages": 180 }
Guide to Essential Cybersecurity Controls (ECC) Implementation 61 Document Classification: Public TLP: White o Expiry of the access period Expected deliverables • Privileged Access Management Policy in the organization (e.g., electronic copy or official hard copy) • Formal approval by the head of the organization or his/her deputy on the policy (e.g., via the organization's official e-mail, paper or electronic signature) • Evidence that outlines the implementation of periodic review requirements of identity and access, e.g., an official and approved document that clarifies the periodic review of the identity and access 2-2-4 The Implementation of the cybersecurity requirements for identity and access management must be reviewed periodically. Control implementation guidelines: • Review the cybersecurity requirements of identity and access management by conducting a periodic assessment (according to a documented and approved plan for review, and based on a planned interval "e.g., quarterly") to implement identity and access management requirements by the Cybersecurity function and in cooperation with relevant departments (such as IT Department) • Review and update cybersecurity requirements for identity and access management in the organization periodically according to a documented and approved plan for review and based on a planned interval or in the event of changes in relevant laws and regulations • Document the review and changes to the cybersecurity requirements for identity and access management in the organization and approve them by the head of the organization or his/her deputy Expected deliverables • Results of identity and access management requirements implementation review in the organization • A document that defines the cybersecurity requirements implementation review cycle for identity and access management at the organization (Compliance Assessment Schedule)
{ "creationdate": "2023-10-22T08:42:54+03:00", "creator": "Microsoft® Word LTSC", "moddate": "2023-10-22T08:42:54+03:00", "page": 60, "page_label": "61", "producer": "Microsoft® Word LTSC", "source": "/content/Guide-to-Essential-Cybersecurity-Controls-(ECC)-Implementation.pdf", "total_pages": 180 }
2-3 Information System and Information Processing Facilities Protection Objective To ensure the protection of information systems and information processing facilities (including workstations and infrastructures) against cyber risks. Controls 2-3-1 Cybersecurity requirements for protecting information systems and information processing facilities must be defined, documented and approved. Relevant cybersecurity tools • Database Security Policy Template. Control implementation guidelines: • Develop and document cybersecurity policy for Information System and Processing Facilities Protection in the organization, including the following o Modern and advanced protection techniques and mechanisms, providing them and ensuring their reliability o Malware Protection Solution Configuration o Scope of devices to be protected, including all workstations, critical systems in the organization, etc • Compliance assessment report that outlines the assessment of the implementation of cybersecurity requirements for identity and access management in the organization • An approved document that sets the policy's review schedule • Policy indicating that it has been reviewed and updated, and that changes have been documented and approved by the head of the organization or his/her deputy • Formal approval by the head of the organization or his/her deputy on the updated policy ( e.g., via the organization's official e -mail, paper or electronic signature)
{ "creationdate": "2023-10-22T08:42:54+03:00", "creator": "Microsoft® Word LTSC", "moddate": "2023-10-22T08:42:54+03:00", "page": 61, "page_label": "62", "producer": "Microsoft® Word LTSC", "source": "/content/Guide-to-Essential-Cybersecurity-Controls-(ECC)-Implementation.pdf", "total_pages": 180 }
Guide to Essential Cybersecurity Controls (ECC) Implementation 63 Document Classification: Public TLP: White o Secure copies of the operating systems used in the organization must be built and prepared in a secure manner, protection programs must be installed, and unused services must be disabled. Such copied must be used in the configuration of desktops and servers o Workstations and systems in the organization must be periodically scanned against malware o Use of external storage media and its security must be restricted o Patch management for systems, applications and devices o Central sources of time synchronization in the organization must be defined to be from a reliable source • Support the organization's policy by the Executive Management This must be done through the approval of the organization head or his/ her deputy Expected deliverables • Cybersecurity policy that covers the requirements of Information System and Processing Facilities Protection at the organization ( e.g., electronic copy or official hard copy) • Formal approval by the head of the organization or his/her deputy on the policy (e.g., via the organization's official e-mail, paper or electronic signature) • Secure Configuration and Hardening Policy Template • Server Security Policy Template • Malware Protection Policy Template • Storage Media Policy Template • Patch Management Policy Template 2-3-2 The cybersecurity requirements for protecting information systems and information processing facilities must be implemented. Control implementation guidelines: • Implement all cybersecurity requirements for Information System and Processing Facilities Protection in the organization. This may include the following o Modern and advanced protection techniques and mechanisms' availability and reliability must be ensured o Scope of devices to be protected and reviewed periodica lly must be ensured
{ "creationdate": "2023-10-22T08:42:54+03:00", "creator": "Microsoft® Word LTSC", "moddate": "2023-10-22T08:42:54+03:00", "page": 62, "page_label": "63", "producer": "Microsoft® Word LTSC", "source": "/content/Guide-to-Essential-Cybersecurity-Controls-(ECC)-Implementation.pdf", "total_pages": 180 }
Guide to Essential Cybersecurity Controls (ECC) Implementation 64 Document Classification: Public TLP: White o Use of external storage media and its security must be restricted o Patches throughout the organization's devices, systems, and applications must be implemented o Central Clock Synchronization and from a reliable source must be implemented Expected deliverables • Documents that confirm the implementation of cybersecurity requirements related to information systems and processing facilities as documented in the policy • An up-to-date list of the organization's virus protection systems and the extent of their download • Restrict the use of external storage media and procedures for approving their use • Evidence that the scope of patches covers all devices, systems and applications • Evidence that the organization uses a central server and a reliable source for timing synchronization 2-3-3 The cybersecurity requirements for protecting information systems and information processing facilities must include at least the following: 2-3-3-1 Advanced, up-to-date and secure management of malware and virus protection on servers and workstations. Control implementation guidelines: • Define and document the requirements of this ECC in the cybersecurity requirements document and approve them by the representative • Provide anti -virus, suspicious programs, and malware protection techniques and mechanisms, including the following o Continuously ensure that the technologies used are current and advanced and contain protection against advanced persistent threat (APT) o Determine the domain of the assets on which the protection system will be installed and identify and update their status o Install the protection system throughout the workstations, systems and servers of the organization
{ "creationdate": "2023-10-22T08:42:54+03:00", "creator": "Microsoft® Word LTSC", "moddate": "2023-10-22T08:42:54+03:00", "page": 63, "page_label": "64", "producer": "Microsoft® Word LTSC", "source": "/content/Guide-to-Essential-Cybersecurity-Controls-(ECC)-Implementation.pdf", "total_pages": 180 }
Guide to Essential Cybersecurity Controls (ECC) Implementation 65 Document Classification: Public TLP: White o Review the protection system periodically to ensure that the scope of the protection system is comprehensive for all workstations, systems, and servers of the organization through the protection system's control unit o Develop and implement a remediation action plan (when needed) to install the protection system on all devices while taking action against devices and systems where it is frequently observed that the modern and advanced protection system is not installed o Follow up on the protecti on system periodically to ensure updates are installed and released on all workstations, systems and servers of the organization Expected deliverables • Documents indicating the identification and documentation of the requirements of this ECC in the policies or procedures of the organization approved by the representative. • List of antivirus systems and evidence of protection against APT (including but not limited to a screenshot or direct example from the APT Monitoring page of the protection system) • Reports or evidence of installing the protection technologies across all workstations, systems and servers of the organization • Reports or evidence of following -up the scope of installing and periodic updating of these technologies 2-3-3-2 Restricted use and secure handling of external storage media. Control implementation guidelines: • Define and document the requirements of this ECC in the cybersecurity requirements document and approve them by the representative • Restrict the use of external storage media by o Groups in the privileged access management system must be created according to authority so that the use of external storage media is automatically not activated on all workstations, the organization's systems, and servers o Documented procedures must be defined to provide approval for the use of external storage media (including but not limited to: requesting
{ "creationdate": "2023-10-22T08:42:54+03:00", "creator": "Microsoft® Word LTSC", "moddate": "2023-10-22T08:42:54+03:00", "page": 64, "page_label": "65", "producer": "Microsoft® Word LTSC", "source": "/content/Guide-to-Essential-Cybersecurity-Controls-(ECC)-Implementation.pdf", "total_pages": 180 }
Guide to Essential Cybersecurity Controls (ECC) Implementation 66 Document Classification: Public TLP: White approvals via e -mail, paper, or through an internal system). Such procedures include - Reason for requesting approval for use - Use start and end date. - Mechanism for handling data stored in storage media so that it is checked prior to use and data is erased after completion. Expected deliverables: • A document (such as approved policy or procedure) indicating the identification and documentation of the requirements related to this control. • Report or evidence indicating the restriction of using external storage media (including but not limited to a screenshot or direct example from access management system showing the vigor restriction of the use of external storage media on workstations and servers). • Approval procedures for the use of storage media for part of the approved devices. 2-3-3-3 Patch management for information systems, software and devices. Control implementation guidelines • Define and document the requirements of this ECC in the cybersecurity requirements document and approve them by the representative. • Define procedures for patch management for systems, devices and applications, which include: o The scope of systems where patches are implemented must be defined to include: - Workstations - Operating Systems - Network Devices - Databases - Applications o Time period required to implement patches must be defined according to the quality of operating system, the system criticality, applicable patches, and importance of patches.
{ "creationdate": "2023-10-22T08:42:54+03:00", "creator": "Microsoft® Word LTSC", "moddate": "2023-10-22T08:42:54+03:00", "page": 65, "page_label": "66", "producer": "Microsoft® Word LTSC", "source": "/content/Guide-to-Essential-Cybersecurity-Controls-(ECC)-Implementation.pdf", "total_pages": 180 }
Guide to Essential Cybersecurity Controls (ECC) Implementation 67 Document Classification: Public TLP: White o Patches procedures must be included in change management methodology or change ma nagement must be included into patch management policy. o Change management approval must be included as part of patch approval form for all systems, devices and applications, including but not limited to: requesting approvals via e -mail, paper, or through a n internal system. o Patches must be implemented to the defined scope after obtaining the necessary approval. o Implementation of patches must be continuously reviewed to ensure that all necessary patches are implemented to all devices, systems, and applications. o Required patches must be periodically monitored to ensure patches by, but not limited to, the protection system, patch management system, and vulnerability alerts sent by email. Expected deliverables: • A document (such as approved policy or procedure) indicating the identification and documentation of the requirements related to this control. • Evidence indicating the inclusion of change management in patches (including but not limited to: including patches in change management methodology or enforcing change management by including it in the requirements of Patch Management). • Approval procedures indicate that change management approval is required for patches. • Reports or evidence that the scope of patches covers all devices, systems and applications. • Reports or evidence that the patches are performed according to the period specified in the procedures (including but not limited to: a screenshot or direct example that displays the date and scope for several samples of patches approved by e-mail, internal system or paper that are performed in advance to include all the organization's devices, systems and applications periodically). 2-3-3-4 Centralized clock synchronization with an accurate and trusted source (e.g., Saudi Standard controls, Metrology and Quality Organization (SASO)). Control implementation guidelines
{ "creationdate": "2023-10-22T08:42:54+03:00", "creator": "Microsoft® Word LTSC", "moddate": "2023-10-22T08:42:54+03:00", "page": 66, "page_label": "67", "producer": "Microsoft® Word LTSC", "source": "/content/Guide-to-Essential-Cybersecurity-Controls-(ECC)-Implementation.pdf", "total_pages": 180 }
Guide to Essential Cybersecurity Controls (ECC) Implementation 68 Document Classification: Public TLP: White • Define and document the requirements of this ECC in the cybersecurity requirements document and approve them by the representative. • Perform time synchronization through the organization's central server NTP. • Configure central server time to synchronize with, but not limited to, one of the following reliable sources: o Saudi Standard controls , Metrology and Quality Organization (time.saso.gov.sa). o King Abdulaziz City for Science and Technology (KACST)(time.isu.net.sa). Expected deliverables: • A document (such as approved policy or procedure) indicating the identification and documentation of the requirements related to this control. • Evidence that the organization uses a central server to synchronize timing (including but not limited to: a screenshot or direct example of the presence of this server in the network with all server details) • Evidence of using a reliable and accurate source (including but not limited to: a screenshot or direct example of the configuration of this server that proves the use of the SASO source or others). 2-3-4 The cybersecurity requirements for protecting information systems and information processing facilities must be reviewed periodically. Control implementation guidelines • Review the cybersecurity requirements for Information System and Processing Facilities Protection in the organization periodically according to a documented and approved plan for review and based on a planned interval ( e.g., periodic review must be conducted annually). • Document the review and chan ges to the cybersecurity requirements for Information System and Processing Facilities Protection in the organization and approve them by the head of the organization or his/her deputy. Expected deliverables: • An approved document that defines the review schedule for the requirements document.
{ "creationdate": "2023-10-22T08:42:54+03:00", "creator": "Microsoft® Word LTSC", "moddate": "2023-10-22T08:42:54+03:00", "page": 67, "page_label": "68", "producer": "Microsoft® Word LTSC", "source": "/content/Guide-to-Essential-Cybersecurity-Controls-(ECC)-Implementation.pdf", "total_pages": 180 }
2-4 Email Protection Objective Controls 2-4-1 Cybersecurity requirements for protecting email service must be defined, documented and approved. Relevant cybersecurity tools: • Email Security Policy Template. Control implementation guidelines • Develop and document cybersecurity policy for email protection in the organization, including the following: o Modern and advanced protection techniques and mechanisms' availability and reliability must be ensured. o Email Protection Solution Configuration Requirements. o Email roles and responsibilities requirements for public and joint accounts. o Size of incoming and outgoing email attachments and the capacity of the mailbox for each user. o Secure design requirements for email infrastructure. • Support the organization's policy by the Execut ive Management. This must be done through the approval of the organization head or his/ her deputy. Expected deliverables: • Email security policy and standard document approved by the organization (e.g., electronic copy or official hard copy).
{ "creationdate": "2023-10-22T08:42:54+03:00", "creator": "Microsoft® Word LTSC", "moddate": "2023-10-22T08:42:54+03:00", "page": 68, "page_label": "69", "producer": "Microsoft® Word LTSC", "source": "/content/Guide-to-Essential-Cybersecurity-Controls-(ECC)-Implementation.pdf", "total_pages": 180 }
Guide to Essential Cybersecurity Controls (ECC) Implementation 70 Document Classification: Public TLP: White • Formal approval by the head of the organization or his/her deputy on the policy (e.g., via the organization's official e-mail, paper or electronic signature). 2-4-2 The cybersecurity requirements for email service must be implemented. Control implementation guidelines • Email protection cybersecurity requirements in the organization must be implemented, including: o Approved cybersecurity requirements must be implemented to protect the organization's email, including but not limited to the use of appropriate and advanced technologies to analyze and filter emails. o Advanced technologies must be used to protect the organization's email from phishing emails and spam messages, including but not limited to the presence of an official and effective subscription with email protection service providers. o Email access must be through an intermediary, including but not limited to Load balancer. Expected deliverables: • An action plan to implement Email protection cybersecurity requirements at the organization. • Email protection controls in the organization must be implemented, including but not limited to: o Advanced email protection and filtering technologies must be used by the organization to block suspicious messages, such as spam and phishing emails. o Antivirus solutions must be configured to email servers in order to scan all inbound and outbound emails. o Email field of the organization must be documented by using necessary means, such as the Sender Policy Framework, and reliability of incoming mail fields must be ensured through modern technologies such as (Incoming Message DMARC verification). 2-4-3 The cybersecurity requirements for protecting the email service must include at the least the following:
{ "creationdate": "2023-10-22T08:42:54+03:00", "creator": "Microsoft® Word LTSC", "moddate": "2023-10-22T08:42:54+03:00", "page": 69, "page_label": "70", "producer": "Microsoft® Word LTSC", "source": "/content/Guide-to-Essential-Cybersecurity-Controls-(ECC)-Implementation.pdf", "total_pages": 180 }
Guide to Essential Cybersecurity Controls (ECC) Implementation 71 Document Classification: Public TLP: White 2-4-3-1 Analyzing and filtering email messages (specifically phishing emails and spam) using advanced and up-to-date email protection techniques. Control implementation guidelines • Define and document the requirements of this ECC in the cybersecurity requirements of email security at the organization and must be approved by the representative. • Define and provide advanced technologies to analyze and filter the organization's emails. • Activate analysis and filtering features in the email protection system through the dashboard. • Periodically review the list of suspicious emails such as phishing messages, spam messages, etc. through the system by the specialized team to follow up email protection. • Add new intrusion indicators related to email in the protection system on an ongoing basis. Expected deliverables: • A document (such as approved policy or procedure) indicating the identification and documentation of the requirements related to this control. • Screenshot or direct example showing subscription and use of modern and advanced technologies to analyze and filter emails in the organization. • Screenshot or direct example of the configuration of email to prove the feature of analyzing and filtering emails, including phishing emails and spam emails. 2-4-3-2 Multi-factor authentication for remote and webmail access to email service. Control implementation guidelines • Define and document the requirements of this ECC in the cybersecurity requirements of email security at the organization and must be approved by the representative. • Activate multi -factor authentication for remote access and organization's webmail access by, but not limited to, one of the following methods: o Text messages linked to the email user's number must be used. o Advanced and reliable applications for multi-factor authentication.
{ "creationdate": "2023-10-22T08:42:54+03:00", "creator": "Microsoft® Word LTSC", "moddate": "2023-10-22T08:42:54+03:00", "page": 70, "page_label": "71", "producer": "Microsoft® Word LTSC", "source": "/content/Guide-to-Essential-Cybersecurity-Controls-(ECC)-Implementation.pdf", "total_pages": 180 }
Guide to Essential Cybersecurity Controls (ECC) Implementation 72 Document Classification: Public TLP: White o Mobile device management applications must be used to allow users' devices (as another element of access) to email for protocols (such as EWS, outlook anywhere protocols) that do not support text messages or applications that provide verification code. Expected deliverables: • A document (such as approved policy or procedure) indicating the identification and documentation of the requirements related to this control. • Screenshot or direct example of email configuration to prove the activation of multi-factor authentication to access via the organization's email webmail. • Screenshot or direct example that proves the use of advanced and reliable technologies for multi-factor authentication. 2-4-3-3 Email archiving and backup. Control implementation guidelines • Define and document the requirements of this ECC in the cybersecurity requirements of email security at the organization and must be approved by the representative. • Define technologies compatible with the organization's technical systems and infrastructure to backup and archive the organization's email. • Define retention period for backup and archiving of the organization's email. • Perform backup at the level of the organization's email servers. • Activate archiving of all email boxes of the organization. Expected deliverables: • A document (such as approved policy or procedure) indicating the identification and documentation of the requirements related to this control. • Screenshot or direct example showing subscription and use of modern and advanced technologies for backup and archiving of email, as well as the approved capacity and duration. • Backup reports for the organization's email servers. • Screenshot or direct example that shows the activation of the email boxes archiving feature.
{ "creationdate": "2023-10-22T08:42:54+03:00", "creator": "Microsoft® Word LTSC", "moddate": "2023-10-22T08:42:54+03:00", "page": 71, "page_label": "72", "producer": "Microsoft® Word LTSC", "source": "/content/Guide-to-Essential-Cybersecurity-Controls-(ECC)-Implementation.pdf", "total_pages": 180 }
End of preview. Expand in Data Studio
README.md exists but content is empty.
Downloads last month
97